ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Kim Dae Won
Department
System Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2024 DTR-SHIELD: Mutual Synchronization for Protecting against DoS Attacks on the SHIELD Protocol with AES-CTR Mode   Sang-su Lee   Sensors, v.24, no.13, pp.1-18 0
Conference
2024 An Analysis of Physical Features for Constructing Neural Network Training Data for Mask ROM Restoration   김대원   한국통신학회 종합 학술 발표회 (하계) 2024, pp.1956-1957
Conference
2023 Research on Automated Binary Restoration of Firmware Bit Information on Mask ROM   김대원   한국 인공지능 학술대회 2023, pp.384-385
Journal
2021 Trends of Hardware-based Trojan Detection Technologies   최양서   전자통신동향분석, v.36, no.6, pp.78-87
Conference
2020 Study for Recovering Crypto Key Mismatch of In-Vehicle Network DTLS   Daewon Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.992-994 1
Journal
2020 Trends in Supply-Chain Security Technologies   김대원   전자통신동향분석, v.35, no.4, pp.149-157
Conference
2020 Implementation of Secure On-board Communication using an AUTOSAR based Automotive Gateway   주홍일   대한전자공학회 학술 대회 (하계) 2020, pp.1483-1485
Conference
2019 Study for Securing In-Vehicle Network Communication Based on Hardware Security Module   김대원   한국스마트미디어학회 학술 대회 (추계) 2019, pp.199-202
Conference
2019 Security Considerations for In-Vehicle Secure Communication   Hongil Ju   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1404-1406 11
Conference
2018 A Study of the Automotive Ethernet and Anomaly Detection System   전부선   전자 정보 통신 학술 대회 (CEIC) 2018, pp.1-3
Journal
2018 Trends in Automotive Ethernet Security Technology   정보흥   전자통신동향분석, v.33, no.5, pp.76-85
Conference
2018 An Access Control Method for Vehicle Management System   Daewon Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.949-952 5
Conference
2017 Implementation of An Access Control Technology for Internet of Things Environments   Daewon Kim   International Conference on Communications, Computation, Networks and Technologies (INNOV) 2017, pp.17-19
Conference
2016 Common Security Requirements for Device Identification System in Internet of Things   Daewon Kim   International Conference on Security Technology (SecTech) 2016, pp.306-309
Conference
2016 Consideration of Security Threats for Identification System in Internet of Things   Daewon Kim   International Conference on Cyber-Technologies and Cyber-Systems (CYBER) 2016, pp.67-68
Conference
2015 Performance Analysis of Encrypted Code Analyzer for Malicious Code Detection   Daewon Kim   International Conference on Communications, Computation, Networks and Technologies (INNOV) 2015, pp.1-3
Conference
2015 A Method Based on Platform Integrity Verification for Activating a Mobile Trusted Module   Daewon Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1177-1179
Conference
2014 A Secure Channel Establishment Method on a Hardware Security Module   Daewon Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.555-556 4
Conference
2014 A Design of Mobile Trusted Module for Application Dedicated Cryptographic Keys   Daewon Kim   International Conference on Mobile Services, Resources, and Users (MOBILITY) 2014, pp.1-5
Conference
2013 An Integrity-Based Mechanism for Accessing Keys in A Mobile Trusted Module   Daewon Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2013, pp.780-782 1
Journal
2013 GESNIC: Detection of HTTP-GET Flooding Attacks for Web Server Protection   Hyunjoo Kim   Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6041-6054 0
Conference
2013 Signature Generation Based on Executable Parts in Suspicious Packets   Daewon Kim   Advanced International Conference on Telecommunications (AICT) 2013, pp.166-169
Conference
2012 Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding   Daewon Kim   International Conference on Information and Communications Security (ICICS) 2012 (LNCS 7618), v.7618, pp.381-391 1
Conference
2012 Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks   Hyunjoo Kim  International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.285-295 6
Conference
2011 Design and Implementation of Secure-NIC System for DDoS Attack Response   김병구   한국정보처리학회 학술 발표 (추계) 2011, pp.996-998
Conference
2011 Automatic Control Method of DDoS Defense Policy through the Monitoring of System Resource   Dae Won Kim   International Conference on Applied Informatics and Computing Theory (AICT) 2011, pp.140-145
Conference
2011 Behavior Tracing Program to Analyze Malicious Features of Unknown Execution File   김대원   한국정보처리학회 학술 발표 (춘계) 2011, pp.941-944
Journal
2011 Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card   김병구   정보보호학회논문지, v.21, no.2, pp.119-129
Conference
2010 Behavior-Based Tracer to Monitor Malicious Features of Unknown Executable File   Dae Won Kim   International Multi-Conference on Computing in the Global Information Technology (ICCGI) 2010, pp.152-156 1
Journal
2009 Polymorphic Worm Detection Using A Fast Static Analysis Approach   오진태   정보보호학회논문지, v.19, no.4, pp.29-39
Conference
2009 Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique   Dae Won Kim   International Conference on Communications (ICC) 2009, pp.1-6 0
Journal
2009 Validation Methods of Suspicious Network Flows for Unknown Attack Detection   Ik Kyun Kim   International Journal of Computers, v.1, no.3, pp.104-114
Conference
2009 A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment   Ik Kyun Kim   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720
Conference
2008 An Architecture of Unknown Attack Detection System against Zero-day Worm   Ik Kyun Kim   International Conference on Applied Computer Science (ACS) 2008, pp.205-211
Journal
2008 Tracing Stored Program Counter to Detect Polymorphic Shellcode   Dae Won Kim   IEICE Transactions on Information and Systems, v.E91-D, no.8, pp.2192-2195 3
Conference
2008 Fast Static Analysis Method to Detect Polymorphic Worm   김대원   한국통신학회 종합 학술 발표회 (하계) 2008, pp.229-232
Journal
2008 Executable Code Recognition in Network Flows Using Instruction Transition Probabilities   Ik Kyun Kim   IEICE Transactions on Information and Systems, v.E91-D, no.7, pp.2076-2078 2
Conference
2008 Function Call Mechanism Based Executable Code Detection for the Network Security   Dae Won Kim   International Symposium on Applications and the Internet (SAINT) 2008, pp.62-67 3
Journal
2008 The Recent Trends of Polymorphic Shellcodes Detection Technologies   김대원   전자통신동향분석, v.23, no.1, pp.145-152
Journal
2008 신종 사이버 공격 탐지 및 차단을 위한 인프라 구축 프로젝트(NoAH 와 ZASMIN 프로젝트)   김대원   주간기술동향, v.알수없음, no.1329, pp.1-12
Conference
2007 A Practical Approach for Detecting Executable Codes in Network Traffic   Ik Kyun Kim   Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.354-363 1
Conference
2006 Hardware Supports for Network Traffic Anomaly Detection   Dae Won Kim   International Conference on Internet Computing and Conference on Computer Games Development (ICOMP) 2006, pp.1-5
Journal
2006 네트워크 보안을 위한 공격 분류법   김대원   주간기술동향, pp.1-13
Conference
2005 Low-power multimedia scheduling using output pre-buffering   Bae Geuntae   International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) 2005, pp.1-8 5