최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기전자통신동향분석 = Electronics and telecommunications trends, v.35 no.4, 2020년, pp.149 - 157
김대원 (보안취약점분석연구실) , 강동욱 (보안취약점분석연구실) , 최용제 (보안취약점분석연구실) , 이상수 (보안취약점분석연구실) , 최병철 (보안취약점분석연구실)
Security threats in supply-chains can be targeted at all the users who use products related to these supply-chains as well as at single equipment or individuals. This implies that these security threats can cause nationwide economic and social damages. In particular, it is true that hardware securit...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
"공급망 공격 사례 분석 및 대응 방안," KISA, 2019-KA-T02, 2019.
"Operation ShadowHammer," Kaspersky, Mar. 2019. https://securelist.com/operation-shadowhammer/89992
OndrejVlckk, "CCleaner APT Attack: A Technical Look Inside," RSAConference2018.
"The Untold Story of NotPetya, the Most Devastating Cyberattack in History," Wired, Oct. 2019. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
"2017 cyberattacks on Ukraine," Wikipedia, Oct. 2019. https://en.wikipedia.org/wiki/2017_cyberattacks_on_Ukraine
"ShadowPad in corporate networks," Kaspersky, Aug. 2017. https://securelist.com/shadowpad-in-corporatenetworks/81432/
"Supply Chain Risks for Information and Communication Technology," Cybersecurity and Infrastructure Security Agency, Dec. 2018. https://www.cisa.gov/sites/default/files/publications/19_0424_cisa_nrmc_supply-chain-risks-forinformation-and-communication-technology.pdf
"The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies," Bloomberg Businessweek, Oct. 2018. https://www.bloomberg.com/news/features/2018-10-04/the-bighack-how-china-used-a-tiny-chip-to-infiltrate-america-stop-companies
"Planting Tiny Spy Chips in Hardware Can Cost as Little as $200," Wired, Oct. 2019. https://www.wired.com/story/plantspy-chips-hardware-supermicro-cheap-proof-of-concept/
박재현, 김승주, "정형 기법을 이용한 하드웨어 AES 모듈 백도어 탐색 연구," 한국정보보호학회 논문지, 제29권 제4호, 2019. 8.
김동원, 한근희, 전인석, 최진영, "자동차 공급망 위험관리(ASCRM) 방안 연구," 한국정보보호학회 논문지, 제25권 제4호, 2015. 8.
Trust-Hub. https://trust-hub.org
Prashast Srivastava, Hui Peng, Jiahao Li, Hamed Okhravi, Howard Shrobe, Mathias Payer, "FirmFuzz: Automated IoT Firmware Introspection and Analysis," Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019. 11.
The Firmware Analysis and Comparison Tool (FACT). https://github.com/fkie-cad/FACT_core
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.