Browse > Article
http://dx.doi.org/10.13089/JKIISC.2018.28.3.655

Vulnerability Analysis of Printer Management System in Public Institutions  

Ji, Woojoong (Department of Computer Science and Engineering, Sungkyunkwan University)
Lee, Kyungmoon (Department of Information Security, Joongbu University)
Lee, Byoungcheon (Department of Information Security, Joongbu University)
Abstract
As digitalization accelerates, the use of digital information is increasing in public institutions such as schools and libraries, and the demand for print services is also increasing. Among many services, printing service on public PCs should charge fee to printer users, but it is a very difficult task for administrators. Print management solutions have been developed and are now widely used to automate these demanding tasks. In this paper, we analyze the vulnerability of printer management solutions used in public institutions. However, the security awareness of public PC administrators and printer management solution developers seem to be lacking.
Keywords
arp spoofing; mitm; printer vulnerability analysis; print spooling; meta data;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Kyoung Hee Joung. (2015). An Analysis on the Results of the Operation for Library Remuneration System. JOURNAL OF THE KOREAN SOCIETY FOR LIBRARY AND INFORMATION SCIENCE, 49(4), 265-288.   DOI
2 Jong-Chul Kim, Young-Seok Kim. (2012). A Study on the Provision of the Copyright Limitations for Libraries of the Korean Copyright Act. Journal of Korean Library and Information Science Society, 43(1), 349-369.   DOI
3 Jae-Hyun Hong, Kyoung-Hee Joung, Ho-Sin Lee. (2005). A Study on Development of the Copyright Guideline on Reproduction and Transmission in Libraries. Journal of Korean Library and Information Science Society, 36(1), 505-525.
4 Donghwi Shin, Younsung Choi, Sangjoon Park, Seungjoo Kim, Dongho Won. (2007). Cryptanalysis on the Authentication Mechanism of the NateOn Messenger. Journal of the Korea Institute of Information Security & Cryptology, 17(1), 67-80.
5 A. Ornaghi and M. Valleri. Man in the middle attacks: demos. In Black Hat USA, 2003.
6 Callegati, F., Cerroni, W., & Ramilli, M. (2009). Man-in-the-Middle Attack to the HTTPS Protocol. IEEE Security & Privacy, 7(1), 78-81.
7 SPLViewer, http://www.lvbprint.de/bin/current/SplViewSetup.exe,2018.06.15
8 Gaw, S., & Felten, E. W. (2006, July). Password management strategies for online accounts. In Proceedings of the second symposium on Usable privacy and security (pp. 44-55).
9 KISA, https://www.kisa.or.kr/business/violation/violation1_sub4.jsp,2018.06.15
10 https://www.krcert.or.kr/consult/software/vulnerability.do?orgSiteUrl=https://www.krcert.or.kr, 2018.06.15