Browse > Article List

논문
1 Improved SITM Attack on the PRESENT Blockcipher
Park, Jonghyun;Kim, Hangi;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.155-162,
2 Implementation of LEA Lightwegiht Block Cipher GCM Operation Mode on 32-Bit RISC-V
Eum, Si-Woo;Kwon, Hyeok-Dong;Kim, Hyun-Ji;Yang, Yu-Jin;Seo, Hwa-Jeong; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.163-170,
3 An LLVM-Based Implementation of Static Analysis for Detecting Self-Modifying Code and Its Evaluation
Yu, Jae-IL;Choi, Kwang-hoon; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.171-179,
4 A Study on Machine Learning Based Anti-Analysis Technique Detection Using N-gram Opcode
Kim, Hee Yeon;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.181-192,
5 Identification of Unknown Cryptographic Communication Protocol and Packet Analysis Using Machine Learning
Koo, Dongyoung; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.193-200,
6 Comparison of Anomaly Detection Performance Based on GRU Model Applying Various Data Preprocessing Techniques and Data Oversampling
Yoo, Seung-Tae;Kim, Kangseok; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.201-211,
7 BPFast: An eBPF/XDP-Based High-Performance Packet Payload Inspection System for Cloud Environments
You, Myoung-sung;Kim, Jin-woo;Shin, Seung-won;Park, Tae-june; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.213-225,
8 Side-Channel Attack of Android Pattern Screen Lock Exploiting Cache-Coherent Interface in ARM Processors
Kim, Youngpil;Lee, Kyungwoon;Yoo, Seehwan;Yoo, Chuck; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.227-242,
9 A Study on the Method of Vulnerability Analysis of Critical Infrastructure Facilities
Shin, Mi-joo;Yoon, Seong-su;Euom, Ieck-chae; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.243-253,
10 Study on Message Exposure to Administrator in Secure Messaging Protocol MLS
Kwon, Songhui;Choi, Hyoung-Kee; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.255-266,
11 Malicious Insider Detection Using Boosting Ensemble Methods
Park, Suyun; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.267-277,
12 A Comparative Study on Type Approval of Maritime Cyber Security and RMF in the View of System Development Lifecycle
Lee, Suwon;Hwang, Seyoung;Hong, Jina;Kim, Byeong-jin; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.279-287,
13 Proposals for GCI Indicators to Improve a National Cybersecurity Level
Kim, Dae kyung;Lee, Ju hyeon;Kim, Ye young;Hyeon, Da eun;Oh, Heung-Ryong;Chin, Byoung moon;Youm, Heung Youl; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.289-307,
14 A Study on the Supplementation of the Korea's National Information Security Manual from the Perspective of Cyber Supply Chain Security
You, Young-in;Bae, Sunha;Kim, So Jeong;Kim, Dong Hee; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.309-327,
15 A Study on the Principle of Application of Privacy by Design According to the Life Cycle of Pseudonymization Information
Kim, Dong-hyun; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.329-339,
16 Efficiency Analysis of Security Management System of Affiliates of Conglomerate Using DEA-SBM Model
Jung, Hyuk;Lee, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.341-353,
17 Impacts of Information Security Culture and Management Leadership Styles on Information Security Behaviors
Park, Sunghwan;Kim, Beomsoo;Park, Jaeyoung; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.355-370,
18 Darknet Traffic Detection and Classification Using Gradient Boosting Techniques
Kim, Jihye;Lee, Soo Jin; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.371-379,
19 Image Generation Method for Malware Detection Based on Machine Learning
Jeon, YeJin;Kim, Jin-e;Ahn, Joonseon; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.381-390,
20 Analysis of Gohr's Neural Distinguisher on Speck32/64 and its Application to Simon32/64
Seong, Hyoeun;Yoo, Hyeondo;Yeom, Yongjin;Kang, Ju-Sung; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.391-404,
21 Utility Analysis of Federated Learning Techniques through Comparison of Financial Data Performance
Jang, Jinhyeok;An, Yoonsoo;Choi, Daeseon; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.405-416,
22 A Fuzzing Seed Generation Technique Using Natural Language Processing Model
Kim, DongYonug;Jeon, SangHoon;Ryu, MinSoo;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.417-437,
23 MS Office Malicious Document Detection Based on CNN
Park, Hyun-su;Kang, Ah Reum; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.439-446,
24 Artificial Intelligence for Autonomous Ship: Potential Cyber Threats and Security
Yoo, Ji-Woon;Jo, Yong-Hyun;Cha, Young-Kyun; / Korea Institute of Information Security and Cryptology , v.32, no.2, pp.447-463,