Vulnerability Analysis Method of Software-based Secure USB |
Kim, Minho
(Chonnam National University)
Hwang, Hyunuk (The Attached Institute of ETRI) Kim, Kibom (The Attached Institute of ETRI) Chang, Taejoo (The Attached Institute of ETRI) Kim, Minsu (Mokpo National University) Noh, Bongnam (Chonnam National University) |
1 | USB 보안 기술 및 제품 동향, 주간기술동향 통권 1380호, 정보통신연구진흥원, 2009년 1월 |
2 | Simson Garfinkel, "Anti-Forensics: Techniques, Detection and Countermeasures," 2nd International Conference on i-Warfare and Security, pp. 77-84, Nov. 2007. |
3 | 정선훈, 한기인, 신현우, "중소기업 산업기밀관리 실태조사 보고서," 한국산업기술진흥협회, 2010년 12월 |
4 | C. Hargreaves and H. Chivers, "Recovery of Encryption Keys from Memory Using a Linear Scan," The Third International Conference on Availability Reliability and Security, pp. 1369-1376, Mar. 2008. |
5 | Jewan Bang, Byeongyeong Yoo, and Sanjin Lee, "Secure USB Bypassing Tool," DFRWS 2010, pp. 114-120, Aug. 2010. |
6 | 정한재, 최윤성, 전웅렬, 양비, 김승주, 원동호, "보안 USB 플래시 드라이브의 취약점 분석과 CC v3.1기반의 보호프로파일 개발," 한국정보보호학회 논문지, 17(6), pp. 99-119, 2007년 12월 |
7 | Robin Snyder, "Some Security Alternatives for Encrypting Information on Storage Devices," InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development, pp. 79-84, 2006. |
8 | J.Alex Halderman and Seth D.Schoen, "Cold-boot attacks on encryption keys," Communications of the ACM vol.52, no. 5, pp. 91-98, May. 2009. DOI ScienceOn |
9 | Stefan Balogh and Matej Pondelik, "Capturing Encryption Keys for Digital Analysis", IEEE:International Conference on Intelligent Data Acquisition and Advanced Computing Systems, vol 2, pp. 759-763. Sep. 2011. |
10 | 이혜원, 박창욱, 이근기, 김권엽, 이상진, "포렌식 관점에서의 보안 USB 현황분석," 한국방송공학회 동계학술대회, pp.63-65, 2008년 2월 |