1 |
Smith, B. (2008). Hacking the kiosk. Retrieved from. [website] [2019. 02. 11] URL: https://pdfs.semanticscholar.org/8b4f/1b9cf984b25141f55670742816e0ea36a54c.pdf.
|
2 |
RSA CONFERENCE COMPUTERS SO FAUX SECURED. Wired Magazine. [website] [2019. 02. 11] URL: https://www.wired.com/2007/02/rsa-conference-/.
|
3 |
Built-in Keylogger Found in MantisTek. [website] [2019. 02. 11] URL:https://thehackernews.com/2017/11/mantistek-keyboard-keylogger.html.
|
4 |
In Flight Hacking System. [website] [2019. 02. 11] URL: https://ioactive.com/in-flight-hacking-system.
|
5 |
Lim, D. B., & Park, J. C. (2011). Link-E-Param: A URL Parameter Encryption Technique for Improving Web Application Security. The Journal of Korean Institute of Communications and Information Sciences, 36(9B), 1073-1081.
DOI
|
6 |
Bau, J., Bursztein, E., Gupta, D., & Mitchell, J. (2010, May). State of the art: Automated black-box web application vulnerability testing. In 2010 IEEE Symposium on Security and Privacy (pp. 332-345). IEEE.
|
7 |
Berners-Lee, T., Masinter, L., & McCahill, M. (1994). Uniform resource locators (URL) (No. RFC 1738).
|
8 |
YoungJae Maeng, DaeHun Nyang. (2008). An Analysis of Replay Attack Vulnerability on Single Sign-On Solutions*. Journal of the Korea Institute of Information Security & Cryptology, 18(1), 103-114.
|
9 |
Syverson, P. (1994, June). A taxonomy of replay attacks [cryptographic protocols]. In Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings (pp. 187-191). IEEE.
|
10 |
Jong-Phil Yang, Kyung-Hyune Rhee. (2002). The proposal of improved secure cookies system based on public-key certificate. The Journal of Korean Institute of Communications and Information Sciences, 27(11C), 1090-1096.
|
11 |
Lee, S., Kim, J., Ko, S., & Kim, H. (2016, August). A security analysis of paid subscription video-on-demand services for online learning. In Software Security and Assurance (ICSSA), 2016 International Conference on (pp. 43-48). IEEE.
|
12 |
Wireshark, [website] [2019.02.11.] UR L: https://www.wireshark.org/download.html.
|
13 |
EdithisCookie, [website] [2019.02.11.] URL: http://www.editthiscookie.com.
|
14 |
Botelho, B. A. P., Nakamura, E. T., & Uto, N. (2012, December). Implementation of tools for brute forcing touch inputted passwords. In Internet Technology And Secured Transactions, 2012 International Conference For (pp. 807-808). IEEE.
|