최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.32 no.5, 2022년, pp.955 - 963
The Internet of Things (IoT), combined with various technologies, is rapidly becoming an integral part of our daily life. While it is rapidly taking root in society, security considerations are relatively insufficient, making it a major target for cyber attacks. Since all devices in the IoT environm...
IDC Korea, "Wordwide Semiannual Internet of Things Spending Guide," Nov. 2021.
KIAT, "Domestic and international IoT industry trends," Apr. 2020.
Se-Ra Oh and Young-Gab Kim, "Security Analysis of MQTT and CoAP protocols in the IoT Environment," CISC-W'16, pp. 297-299, Apr. 2016.
Jong-mo Hwang, "Internet of Things (IoT) trends and future prospects in the financial sector," Financial Security Institute, Jul. 2016.
Ministry of Science and ICT, "Cyber Threat Analysis for 21 Years and Analysis for 22 Years," Dec. 2021.
boannews and securityword, "2021 Domestic and overseas security market forecast report," Feb. 2021.
Unit 42, "2020 Unit 42 IoT Threat Report," Mar. 2020.
iotforall, "The 5 Worst Examples of IoT Hacking and Vulnerabilities in Recorded History" https://www.iotforall.com/5-worst-iothacking-vulnerabilities, Last Accessed 19 Sep. 2022.
Thierry Zoller, "TLS/SSLv3 renegotiation vulnerability explained," G-SEC, Apr. 2011.
HITACHI, "HIRT-PUB15003: [tutorial] SSL/TLS implementations 'FREAK' issue" https://www.hitachi.com/hirt/publications/hirt-pub15003/index.html, Last Accessed 12 Aug. 2022.
c0D3M, "FREAK Attack Explained" https://medium.com/@c0D3M/freak-attack-explained-3048ab9d3f30, Last Accessed 12 Aug. 2022.
David Adrian et al., "Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice." CCS'15, pp 5-17, Oct. 2015.
Red Hat, "Logjam: TLS Vulnerability (CVE-2015-4000)" https://access.redhat.com/ko/articles/1480443, Last Accessed 12 Aug. 2022.
THE DROWN Attack, "drownattack" https://drownattack.com/, LastAccessed 12 Aug. 2022.
IInvicti, "How the BEAST AttackWorks" https://www.netsparker.com/blog/web-security/how-the-beast-attack-works/, Last Accessed 12 Aug. 2022.
Ivan Ristic, "CRIME: InformationLeakage Attack against SSL/TLS" https://blog.qualys.com/product-tech/2012/09/14/crime-information-leakageattack-against-ssltls, Last Accessed12 Aug. 2022.
Amrita Mitra, "What is the CRIMEAttack?" https://www.thesecuritybuddy.com/vulnerabilities/what-is-crime-attack/, Last Accessed 12 Aug. 2022.
BREACH, "breachattack" https://breachattack.com/, Last Accessed 12Aug.2022.
Team Sesame, "Padding Oracle attacks" https://tlseminar.github.io/padding-oracle/, Last Accessed 12 Aug. 2022.
Tomasz Andrzej Nidecki, "What IsthePOODLE Attack?" https://www.acunetix.com/blog/web-security-zone/whatis-poodle-attack/, Last Accessed12Aug. 2022.
Bodo Mol er, Thai Duong andKrzysztof Kotowicz, "This POODLEBits: Exploiting The SSL 3.0 Fallback" https://www.openssl.org/~bodo/ssl-poodle.pdf, Sep. 2014.
Nadhem J. AlFardan et al., "Onthesecurity of RC4 in TLS," SEC'13, pp305-320, Aug. 2013.
Min Se-ah, "What is the securityquality of HTTPS?" https://www.boannews.com/media/view.asp?idx51115, Last Accessed 17 Jul. 2022.
RC4 NOMORE, "RC4 attack" https://www.rc4nomore.com/, Last Accessed12Aug. 2022.
ALPACA Attack, "alpaca attack" https://alpaca-attack.com/, Last Accessed 12 Aug. 2022.
Daniel J. Dubois and David Choffnes, "IoTLS: Understanding TLS Usage in Consumer IoT Devices," IMC '21, pp 165-178, Nov. 2021.
Ralph Holz, Jens Hiller, Johanna Amann, Abbas Razaghpanah, Thomas Jost, Narseo Vallina-Rodriguez, and Oliver Hohlfeld, "Tracking the deployment of TLS 1.3 on the Web: A story of experimentation and centralization," ACM SIGCOMM Computer Communication Review 2020, vol. 50, no. 3, pp. 3-15, Jul. 2020.
E. Rescorla, "The Transport LayerSecurity (TLS) Protocol Version1.3," RFC 8446, Aug. 2018.
Patrick Nohe, "TLS 1.3: Everythingyou need to know" https://www.thesslstore.com/blog/tls-1-3-everything-possibly-needed-know/, Last Accessed13Jul. 2022.
Tech School, "A complete overview of SSL/TLS and its cryptographic system" https://dev.to/techschoolguru/a-complete-overview-of-ssl-tls-and-its-cryptographic-system-36pd, Last Accessed 13 Jul. 2022.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.