최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국융합학회논문지 = Journal of the Korea Convergence Society, v.12 no.1, 2021년, pp.11 - 17
If a vulnerability in the software connected to the network to obtain the user's privilege, a remote attacker could gain the privilege to use the computer. In addition, in a user environment in which an operating system for a specific series is used a lot, if a problem occurs in the operating system...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
S. C. Lim & D. Y. Kim. (2018). Comparative Analysis of Network-based Vulnerability Scanner for application Nuclear Power Plants. Journal of the Korea Institute of Information and Communication Engineering, 22(10), 1392-1397. DOI : 10.12811/JKCS.201.11.2.129
T. K. Lee & S. Son. (2018). Performance Analysis of Open Source Web Vulnerability Scanner. Communications of the Korean Institute of Information Scientists and Engineers, 36(3), 42-49.
K. S. Oh & J. C. Ryou. (2016). A Study on Tools for Control System Platform Vulnerability Scanner Development. Proceedings of the Korea Information Processing Society Conference, 51, 202-205.
K. Y. Lim, S. H. Kang, & S. J. Kim. (2016). A study on the security weakness diagnosis method for commercial and open software based on fuzzing. REVIEW OF KIISC, 26(1), 27-33.
R. Fayzbek, M. J. Choi & J. B. Yun. (2018). Search-Based Concolic Execution for SW Vulnerability Discovery. IEICE TRANSACTIONS on Information and Systems, E101-D(10). 2526-2529. DOI : 10.1587/transinf.2018EDL8052
P. Godefroid, M. Y. Levin & D. Molnar. (2012). SAGE: Whitebox Fuzzing for Security Testing. Communications of the ACM, 55(3). 40-44. doi:10.1145/2093548.2093564
S. H. Paek, H. G. Oh & D. H. Lee. (2006). Study of Methodologies for New Vulnerability Checking Module Development Proper to User Level. Journal of information and security, 6(4). 29-40
I. Haller, A. Slowinska, M. Neugschwandtner & H. Bos. (2013). Dowsing for overflows: A guided fuzzer to find buffer boundary violations. In Proceedings of the USENIX Security Symposium. (pp. 49-63). Washington : USENIX
W. You, P. Zong, K. Chen, X. Wang, X. Liao & P. Bian. (2017, Nov). SemFuzz: Semantics- based automatic generation proof-of-concept exploits. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. (pp.2139-2154). Dallas : ACM
S. McClure, J. Scambray & G. Kurtz. (2012). Hacking Exposed 7: Network Security Secrets and Solutions. New york : McGraw Hill.
A. Takanen, J. D. Demott & C. Miller. (2018). Fuzzing for Software Security Testing and Quality Assurance. Boston : Artech House.
P. Brandon. (2017). Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools. San Francisco : No Starch Press
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.