최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.31 no.5, 2021년, pp.919 - 939
홍바울 (고려대학교 정보보호대학원) , 김예준 (고려대학교 정보보호대학원) , 조광수 (고려대학교 정보보호대학원) , 김승주 (고려대학교 정보보호대학원)
As a next-generation communication technology, 5G networks are capable of handling large amounts of traffic based on higher speeds, shorter communication delays, and higher connectivity compared to 4G networks. In this 5G network environment, base stations are installed all over the city at high den...
ITU. "FG IMT-2020" (2015) [Online]. Available: https://www.itu.int/en/ITU-T/focusgroups/imt-2020/Pages/default.aspx, May 2020.
Lee Dong-myeon. "The basis of the 4th industrial revolution, intelligent hyper-connected network" TTA Journal ,2017
Park Seon-hoo. "The future of 5G mobile communication (5G) - Is it good news for small and medium-sized telecommunication equipment companies?" IBK Economic Research Institute, 2018
Lee, Young-dae, et al. "Method and terminal for performing handover in mobile communications system of point-to-multipoint service." U.S. Patent Application No. 12/113,816.
Fang, Dongfeng, Yi Qian, and Rose Qingyang Hu. "Security for 5G mobile wireless networks." IEEE Access. vol. 6, pp. 4850-4874, 2017.
Arfaoui, Ghada, et al. "A security architecture for 5G networks." IEEE Access, vol. 6, pp. 22466-22479, 2018.
Ahmad, Ijaz, et al. "Overview of 5G security challenges and solutions." IEEE Communications Standards Magazine, vol. 2, pp. 36-43, 2018.
Ferrag, Mohamed Amine, et al. "Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes." Journal of Network and Computer Applications, vol. 101, pp. 55-82, 2018.
Fang, Dongfeng, Yi Qian, and Rose Qingyang Hu. "Security requirement and standards for 4G and 5G wireless systems." GetMobile: Mobile Computing and Communications 22.1, pp. 15-20, 2018.
Sattar, Danish, et al. "Threat Modeling in LTE Small Cell Networks." IEEE Canadian Conference on Electrical & Computer Engineering (CCECE), 2018.
Jover, Roger Piqueras, and Vuk Marojevic. "Security and protocol exploit analysis of the 5G specifications." IEEE Access, vol. 7, pp. 24956-24963, 2019.
Ahmad, Ijaz, et al. "Security for 5G and beyond." IEEE Communications Surveys & Tutorials. vol. 21, pp. 3682-3722, 2019.
Soldani, David. "5G and the Future of Security in ICT." IEEE International Telecommunication Networks and Applications Conference (ITNAC), 2019.
Cao, Jin, et al. "A survey on security aspects for 3GPP 5G networks." IEEE communications surveys & tutorials. vol. 22, pp. 170-195, 2019.
Tian, Zhihong, et al. "Automated attack and defense framework for 5G security on physical and logical layers." arXiv preprint arXiv: 1902.04009, 2019.
Fang, Dongfeng, and Yi Qian. "5G wireless security and privacy: Architecture and flexible mechanisms." IEEE Vehicular Technology Magazine, vol. 15, pp. 58-64, 2020.
Sun, Yanbin, et al. "Automated Attack and Defense Framework toward 5G Security." IEEE Network. vol. 34, pp. 247-253, 2020.
Dutta, Ashutosh, and Eman Hammad. "5G Security Challenges and Opportunities: A System Approach." IEEE 5G World Forum (5GWF). 2020.
3GPP. "Release 15" [Online]. Available: https://www.3gpp.org/release-15
3GPP. "Release 17" [Online]. Available: https://www.3gpp.org/release-17
ETSI. "System Architecture Evolution (SAE); Security architecture" [Online]. Available: https://www.etsi.org/deliver/etsi_ts/133400_133499/133401/15.04.00_60/ts_133401v150400p.pdf
ETSI. "Security architecture and procedures for 5G system" [Online]. Available: https://www.etsi.org/deliver/etsi_ts/133500_133599/133501/15.04.00_60/ts_133501v150400p.pdf, Jun, 2020
3GPP, "Security Assurance Specification (SCAS) for the next generation Node B (gNodeB) network product class" [Online], Available: https://portal.3gpp.org/desktopmodules/Specifications/SpecificationDetails.aspx?specificationId3444
GSMA. "5G Implementation Guidelines: NSA Option 3" [Online]. Available: https://www.gsma.com/futurenetworks/wiki/5g-implementation-guidelines/
Ma Zhendong, Christoph Schmittner. "Threat modeling for automotive security analysis" Advanced Science and Technology Letters. vol. 139, pp.333-339, 2016.
Montana State University. "Threat Modeling" [Online]. Available: https://www.cs.montana.edu/courses/csci476/topics/threat_modeling.pdf
Shostack, Adam. Threat modeling: Designing for security. John Wiley & Sons, 2014.
Caroline Mockel, Ali E. Abdallah. "Threat modeling approaches and tools for securing architectural designs of an e-banking application" IEEE International Conference on Information Assurance and Security. 2010.
University of Missouri - St. Louis. "Data Flow Diagrams Examples" [Online] Available: http://www.umsl.edu/~sauterv/analysis/ dfd/dfd_intro.html
Lucidchart. "What is a Data FDlow Diagram" [Online] Available: https://www.lucidchart.com/pages/data-flow-diagram
Marwan Abi-Antoun, Daniel Wang, Peter Torr. "Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security" [Online] Available: http://reports-archive.adm.cs.cmu.edu/anon/isri2006/CMU-ISRI-06-124.pdf, 2006
Smartdraw. "Data Flow Diagram" [Online] Available: https://www.smartdraw.com/data-flow-diagram
Miller, Charlie. "Battery firmware hacking." Black Hat USA (2011): 3-4.
Shen, Di. "Exploiting TrustZone on android." Black Hat USA (2015).
Shaik. Altaf, and Ravishankar Borgaonkar. "LTE Network Automation under Threat." (2018)
MITRE. "CVE-2015-0006" [Online]. Available: https://cve.mitre.org/cgi-bin/cvename.cgi?nameCVE-2015-0006
MITRE. "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" [Online]. Available:
Labib, Mina, Vuk Marojevic, and Jeffrey H. Reed. "Analyzing and enhancing the resilience of LTE/LTE-A systems to RF spoofing." IEEE Conference on Standards for Communications and Networking (CSCN), 2015.
Behrad, Shanay, et al. "A new scalable authentication and access control mechanism for 5G-based IoT." Future Generation Computer Systems. vol. 108, pp. 46-61, 2020.
Long, James, and John Roth. "A Novel Denial of Service Vulnerability in Long Term Evolution Cellular Networks.", 2019.
Park, Yongsuk, and Taejoon Park. "A survey of security threats on 4G networks." IEEE Globecom workshops, 2007.
Hu, Xinxin, et al. "A systematic analysis method for 5G non-access stratum signalling security." IEEE Access, vol. 7, pp. 125424-125441, 2019.
Fievisohn, Lauren M. Wagoner. "A taxonomy of firmware extraction methodologies." The University of Tulsa, 2014.
Gupta, Akhil, Rakesh Kumar Jha, and Sanjeev Jain. "Attack modeling and intrusion detection system for 5G wireless communication network." International Journal of Communication Systems. vol. 30, 2017.
Thomas, Sam Lloyd. "Backdoor detection systems for embedded devices." University of Birmingham, 2018.
Jover, Roger Piqueras, Joshua Lackey, and Arvind Raghavan. "Enhancing the security of LTE networks against jamming attacks." EURASIP Journal on Information Security, 2014.
Wang, Jiang, et al. "Firmware-assisted memory acquisition and analysis tools for digital forensics." IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011.
Basnight, Zachry H. Firmware counterfeiting and modification attacks on programmable logic controllers. AIR FORCE INST OF TECH WRIGHT-PATTERSON AFB OH GRADUATE SCHOOL OF ENGINEERING AND MANAGEMENT, 2013.
Basnight, Zachry, et al. "Firmware modification attacks on programmable logic controllers." International Journal of Critical Infrastructure Protection. vol. 6, pp. 76-84, 2013.
Huang, Junying, et al. "Instruction Vulnerability Test and Code Optimization Against DVFS Attack." IEEE International Test Conference in Asia (ITC-Asia). 2019.
Dehnel-Wild, Martin, and Cas Cremers. "Security vulnerability in 5G-AKA draft." Department of Computer Science, University of Oxford, Tech. Rep (2018): 14-37.
Kim, Hongil, et al. "Touching the untouchables: Dynamic security analysis of the LTE control plane." IEEE Symposium on Security and Privacy (SP). 2019.
Bikos, Anastasios N., and Nicolas Sklavos. "LTE/SAE security issues on 4G wireless networks." IEEE Security & Privacy. vol. 11, pp. 55-62, 2012.
Fei, Teng, and Wenye Wang. "LTE is vulnerable: implementing identity spoofing and denial-of-service attacks in LTE networks." IEEE Global Communications Conference (GLOBECOM). 2019.
Chandavarkar, B. R. "Mitigation of desynchronization attack during inter-eNodeB handover key management in LTE." IEEE International Conference on Contemporary Computing (IC3). 2015.
Tu, Guan-Hua, et al. "New security threats caused by IMS-based SMS service in 4G LTE networks." Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016.
Shaik, Altaf, et al. "New vulnerabilities in 4G and 5G cellular access network protocols: exposing device capabilities." Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks. 2019.
Schulz, Matthias, Daniel Wegemer, and Matthias Hollick. "Nexmon: Build your own WiFi testbeds with low-level MAC and PHY-access using firmware patches on off-the-shelf mobile devices." Proceedings of the 11th Workshop on Wireless Network Testbeds, Experimental evaluation & CHaracterization. 2017.
Palmarini, Francesco. "Reverse Engineering Of Embedded Architectures." BS thesis. Universita Ca'Foscari Venezia, 2015.
Saxena, Neetesh, and Narendra S. Chaudhari. "Prevention of SMS against Repudiation Attack over the GSM Network." Journal of Information Assurance & Security, pp. 155-166, 2013.
Chipounov, Vitaly, and George Candea. "Reverse engineering of binary device drivers with RevNIC." Proceedings of the 5th European conference on Computer systems. 2010.
Gupta, Shubham, Balu L. Parne, and Narendra S. Chaudhari. "Security vulnerabilities in handover authentication mechanism of 5G network." IEEE International Conference on Secure Cyber Computing and Communication (ICSCCC). 2018.
Lee, Gyuhong, et al. "This is your president speaking: spoofing alerts in 4G LTE networks." Proceedings of the 17th Annual International Conference on Mobile Systems, Applications, and Services. 2019.
Luo, Shibo, et al. "Toward vulnerability assessment for 5G mobile communication networks." IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity). 2015.
Li, Xiaona, et al. "Vulnerability analysis and verification for LTE initial synchronization mechanism." IEEE Sarnoff Symposium. 2015.
Hofer, Mark, John McEachen, and Murali Tummala. "Vulnerability analysis of LTE location services." IEEE Hawaii International Conference on System Sciences. 2014.
Lichtman, Marc, et al. "Vulnerability of LTE to hostile interference." IEEE Global Conference on Signal and Information Processing. 2013.
Cui, Ang, Michael Costello, and Salvatore Stolfo. "When firmware modifications attack: A case study of embedded exploitation." Presented at the 20th Annual Network & Distributed System Security Symposium, 2013.
Chen, Yue, et al. "Downgrade attack on TrustZone." arXiv preprint arXiv:1707.05082, 2017.
Cichonski, Jeffrey, Joshua Franklin, and Michael Bartock. "Guide to LTE security." National Institute of Standards and Technology, No. NIST Special Publication (SP) 800-187 (Draft). 2016.
R.Scandariato, K.Wuyts, W.Joosen. "A descriptive study of Microsoft's threat modeling technique" Requirement Engineering. 2013.
N.Mead. "The Hybrid Threat Modeling Method", Carnegie Mellon University, Pittsburgh CMU/SEI-2018-TN-002, 2018.
Shevchenko, Nataliya, et al. "Threat modeling: a summary of available methods." Carnegie Mellon University Software Engineering Institute Pittsburgh United States 2018.
CyberArmyID. "Threat Modeling Using STRIDE" [Online] Available: https://owasp.org/www-pdf-archive//Threat_Modeling_Using_STRIDE_v1.1.pdf, 2017
khan, Rafiullah, et al. "STRIDE-based threat modeling for cyber-physical systems." IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). 2017.
FFRI, Inc. "STRIDE Variants and Security Requirements-based Threat Analysis" [Online] Available: https://www.ffri.jp/assets/files/monthly_research/MR201610_STRIDE_Variants_and_Security_Requirements-based_Threat_Analysis_ENG.pdf, 2016
Saini, Vineet, Qiang Duan, Vamsi Paruchuri. "Threat modeling using attack trees" Journal of Computing Sciences in Colleges, pp. 124-131, 2008.
Salaun, M. "Practical overview of a Xen covert channel." Journal of Computer Virology and Hacking Techniques, pp. 317-328, 2010.
Tamer S. Fatayer, Sherif Khattab and Fatma A. Omara. "OverCovert: Using Stack-Overflow Software Vulnerability to Create a Covert Channel." IFIP International Conference on New Technologies, Mobility and Security, pp. 1-5, 2011.
David Martin. "AVA updates in v3.0" International Common Criteria Conference, 2005.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.