최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.31 no.3, 2021년, pp.291 - 307
김병연 (고려대학교 정보보호대학원) , 김휘강 (고려대학교 정보보호대학원)
There has been global efforts to prevent the further spread of the COVID-19 and get society back to normal. 'Contact tracing' is a crucial way to detect the infected person. However the contact tracing makes another concern about the privacy violation of the personal data of infected people, release...
WHO, "COVID 19 Public Health Emergency of International Concern," GLOPID-R, Feb. 2020.
UN High Commissioner, "The coronavirus outbreak is a test of our systems, values and humanity," UNHCR, Mar. 2020.
National Human Rights Chairman, "Corona19 Crisis, a test stand to verify human rights capabilities in our society," National Human Rights Commission, Apr. 2020.
Jung Yeon-je, "South korea is reporting intimate details of covid-19 cases: has it helped?," Nature, Mar. 2020.
Seo Hangi. "If the public announcement of the movement about Corona 19 is invading privacy? Can be corrected by appealing," yunhap news, Mar. 2020.
Lambert S, Ostwald T, Shostack A, Hernan, S. "Threat modeling uncover security design flaws using the stride approach," MSDN Magazine-Louisville, pp. 68-75. Nov. 2016.
Marco M, Tony U. "Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis," pp. 1-696. John Wiley Sons, May. 2015.
James S, Carol W, Christopher A, Audrey D. "Introduction to the OCTAVE Approach," SEI, pp. 1-37. Sep. 2003.
"ETSI TS 102 165-1 v4.2.3 - Telecommunications and Internet converged Services and Protocols for Advanced Networking(TISPAN); Methods and protocols; Part 1: Method and proforma for Threat, Risk, Vulnerability Analysis," pp. 1-79. Mar. 2011.
James S, Carol W, Christopher A, Audrey D. "Systems thinking for safety and security," Proceedings of the 29th Annual Computer Security Applications Conference, pp. 1-8. Dec. 2013.
Joosen W, Wuyts K. "LINDDUN privacy threat modeling: a tutorial," pp. 1-38. Jul. 2015.
Bradley Potteiger, Goncalo Martins, Xenofon Koutsoukos. "Software and attack centric integrated threat modeling for quantitative risk assessment," In Proceedings of the Symposium and Bootcamp on the Science of Security, pp. 99-108. Potteiger, Apr. 2016.
Tadayoshi K, Tamara D, Batya F. Poster, "The security cards: a security threat brainstorming toolkit," University of Washington, 2013.
Shull F, Vemuru K, Villadsen O, Mead N. "A Hybrid Threat Modeling Method," Carnegie Mellon University - Software Engineering Institute, pp. 1-53. Mar. 2018.
Larcom B, Eddington M, Saitta, P. "Trike v1 methodology document," pp. 1-17. Jul. 2005.
A. Agarwal. "Vast methodology: Visual, agile, and simple threat modeling," Prescott Valley, 2016.
Microsoft, "Microsoft threat modeling tool threats," microsoft docs. Aug. 2017.
Kristian Beckers, "Comparing Privacy Requirements Engineering Approaches," 2012 7th IEEE International Conference on Availability, Reliability and Security(ARES), pp. 574-581, Aug. 2012.
Hojun Lee, Seungjoo Kim, Sangjin Lee. "Evaluation Criteria for COVID-19 Contact Tracing Technology and Security Analysis," Korea Institute Of Information Security & Cryptology, Dec. 2020.
Carmela Troncoso. "Decentralized Privacy-Preserving Proximity Tracing," Arxiv, Apr. 2020.
Serge Vaudenay. "Analysis of DP3T Between Scylla and Charybdis," IACR, Apr. 2020.
Apple, Google, "Privacy-Preserving Contact Tracing ver 1.2 BY APPLE INC. AND GOOGLE INC," Apr. 2020.
Yaron Gvili. "SECURITY ANALYSIS OF THE COVID-19 CONTACT TRACING SPECIFICATIONS BY APPLE INC. AND GOOGLE INC," Arxiv, https://eprint.iacr.org/2020/428 Apr. 2020.
Joseph K. Liu, Man Ho Au, Tsz Hon Yuen, Cong Zuo, Jiawei Wang, Amin Sakzad, Xiapu Luo, and Li Li. "Privacy-Preserving COVID-19 Contact Tracing App: A Zero-Knowledge Proof Approach," Arxiv, Jul. 2020.
E. Ben-Sasson, A. Chiesa, E. Tromer, and M. Virza, "Succinct non-interactive zero knowledge for a von neumann architecture." USENIX Security Symposium, pp. 781-796. 2014.
W. Diffie, E. Hellman, "New Directions in Cryptography," IEEE Transaction on theory, Nov. 1976.
Bluetooth SIG. "Core Specification," https://www.bluetooth.com/specifications/bluetooth-core-specification 5.2, Dec. 2019.
Nist, "CVE-2020-6616," https://nvd.nist.gov/vuln/detail/ CVE-2020-6616, Aug. 2020.
Nist, "CVE-2020-0022," https://nvd.nist.gov/vuln/detail/ CVE-2020-0022, Feb. 2020.
Nist, "CVE-2020-9770," https://nvd.nist.gov/vuln/detail/ CVE-2020-9770, Apr. 2020.
Nist, "CVE-2020-9023," https://nvd.nist.gov/vuln/detail/ CVE-2020-9023, Feb. 2020.
Depoux A, Martin S, Karafillakis E, Preet R, Wilder-Smith A, Larson H. "The pandemic of social media panic travels faster than the COVID-19 outbreak," J Travel Med. May. 2020.
Becker, Johannes & Li, David & Starobinski, David. "Tracking Anonymized Bluetooth Devices," Proceedings on Privacy Enhancing Technologies. Jul. 2019.
Jide S. Edu, Jose M. Such, and Guillermo Suarez-Tangil. "Smart Home Personal Assistants: A Security and Privacy Review," ACM Comput, Dec. 2020.
Thomas Willingham, Cody Henderson, Blair Kiel, Md Shariful Haque, and Travis Atkison. "Testing vulnerabilities in bluetooth low energy," ACMSE, Mar. 2018.
Or Ami, Yuval Elovici, and Danny Hendler. "Ransomware prevention using application authentication-based file access control," SAC, Apr. 2018.
Hyman, David A. and Kovacic, William E., "Implementing Privacy Policy: Who Should Do What?," GWU Legal Studies Research Paper, Feb. 2018.
L. Scripcariu, F. Diaconu, P. D. Matasaru and L. Gafencu, "AES Vulnerabilities Study," ECAI, Jun. 2018.
ARMIS, "Exploiting BlueBorne," https://www.armis.com/blueborne/ Blackhat, Sep. 2017.
Veelasha Moonsamy, Lynn Batten, "Mitigating man-in-the-middle attacks on smartphones," Australian Information Security Management Conference, Jan. 2014.
Slawomir Jasek, "GATTacking Bluetooth Smart Devices," Black hat USA conference, 2016.
Sam Bowne, "Making an SSL Auditing Proxy with a Mac and Burp," samsclass, 2015.
CheckPoint, "CallJam," https://blog.checkpoint.com/2016/09/08/calljam-android-malware-found-on-google-play/, Sep. 2016.
Grant Bugher, "CRNG Cracked," http://perimetergrid.com/wp/2008/05/17/ubuntudebian-crng-cracked-ssh-vulnerable/, May. 2008.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.