ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Kim Dae Won
Department
System Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Conference
2024 A Study on Training a Time-series Neural Network for Predicting Mask ROM Firmware Restoration   김대원   한국 인공지능 학술대회 2024, pp.210-211
Journal
2024 DTR-SHIELD: Mutual Synchronization for Protecting against DoS Attacks on the SHIELD Protocol with AES-CTR Mode   Sang-su Lee   Sensors, v.24, no.13, pp.1-18 1
Conference
2024 An Analysis of Physical Features for Constructing Neural Network Training Data for Mask ROM Restoration   김대원   한국통신학회 종합 학술 발표회 (하계) 2024, pp.1956-1957
Conference
2023 Research on Automated Binary Restoration of Firmware Bit Information on Mask ROM   김대원   한국 인공지능 학술대회 2023, pp.384-385
Journal
2021 Trends of Hardware-based Trojan Detection Technologies   최양서   전자통신동향분석, v.36, no.6, pp.78-87
Conference
2020 Study for Recovering Crypto Key Mismatch of In-Vehicle Network DTLS   Daewon Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.992-994 1
Conference
2020 Implementation of Secure On-board Communication using an AUTOSAR based Automotive Gateway   주홍일   대한전자공학회 학술 대회 (하계) 2020, pp.1483-1485
Journal
2020 Trends in Supply-Chain Security Technologies   김대원   전자통신동향분석, v.35, no.4, pp.149-157
Conference
2019 Study for Securing In-Vehicle Network Communication Based on Hardware Security Module   김대원   한국스마트미디어학회 학술 대회 (추계) 2019, pp.199-202
Conference
2019 Security Considerations for In-Vehicle Secure Communication   Hongil Ju   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1404-1406 13
Conference
2018 A Study of the Automotive Ethernet and Anomaly Detection System   전부선   전자 정보 통신 학술 대회 (CEIC) 2018, pp.1-3
Journal
2018 Trends in Automotive Ethernet Security Technology   정보흥   전자통신동향분석, v.33, no.5, pp.76-85
Conference
2018 An Access Control Method for Vehicle Management System   Daewon Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.949-952 5
Conference
2017 Implementation of An Access Control Technology for Internet of Things Environments   Daewon Kim   International Conference on Communications, Computation, Networks and Technologies (INNOV) 2017, pp.17-19
Conference
2016 Common Security Requirements for Device Identification System in Internet of Things   Daewon Kim   International Conference on Security Technology (SecTech) 2016, pp.306-309
Conference
2016 Consideration of Security Threats for Identification System in Internet of Things   Daewon Kim   International Conference on Cyber-Technologies and Cyber-Systems (CYBER) 2016, pp.67-68
Conference
2015 Performance Analysis of Encrypted Code Analyzer for Malicious Code Detection   Daewon Kim   International Conference on Communications, Computation, Networks and Technologies (INNOV) 2015, pp.1-3
Conference
2015 A Method Based on Platform Integrity Verification for Activating a Mobile Trusted Module   Daewon Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2015, pp.1177-1179
Conference
2014 A Secure Channel Establishment Method on a Hardware Security Module   Daewon Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2014, pp.555-556 4
Conference
2014 A Design of Mobile Trusted Module for Application Dedicated Cryptographic Keys   Daewon Kim   International Conference on Mobile Services, Resources, and Users (MOBILITY) 2014, pp.1-5
Conference
2013 An Integrity-Based Mechanism for Accessing Keys in A Mobile Trusted Module   Daewon Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2013, pp.780-782 1
Journal
2013 GESNIC: Detection of HTTP-GET Flooding Attacks for Web Server Protection   Hyunjoo Kim   Information : An International Interdisciplinary Journal, v.16, no.8(B), pp.6041-6054 0
Conference
2013 Signature Generation Based on Executable Parts in Suspicious Packets   Daewon Kim   Advanced International Conference on Telecommunications (AICT) 2013, pp.166-169
Conference
2012 Endpoint Mitigation of DDoS Attacks Based on Dynamic Thresholding   Daewon Kim   International Conference on Information and Communications Security (ICICS) 2012 (LNCS 7618), v.7618, pp.381-391 1
Conference
2012 Implementation of GESNIC for Web Server Protection against HTTP GET Flooding Attacks   Hyunjoo Kim  International Workshop on Information Security Applications (WISA) 2012 (LNCS 7690), v.7690, pp.285-295 6
Conference
2011 Design and Implementation of Secure-NIC System for DDoS Attack Response   김병구   한국정보처리학회 학술 발표 (추계) 2011, pp.996-998
Conference
2011 Automatic Control Method of DDoS Defense Policy through the Monitoring of System Resource   Dae Won Kim   International Conference on Applied Informatics and Computing Theory (AICT) 2011, pp.140-145
Conference
2011 Behavior Tracing Program to Analyze Malicious Features of Unknown Execution File   김대원   한국정보처리학회 학술 발표 (춘계) 2011, pp.941-944
Journal
2011 Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card   김병구   정보보호학회논문지, v.21, no.2, pp.119-129
Conference
2010 Behavior-Based Tracer to Monitor Malicious Features of Unknown Executable File   Dae Won Kim   International Multi-Conference on Computing in the Global Information Technology (ICCGI) 2010, pp.152-156 1
Journal
2009 Polymorphic Worm Detection Using A Fast Static Analysis Approach   오진태   정보보호학회논문지, v.19, no.4, pp.29-39
Conference
2009 Lightweight Static Analysis to Detect Polymorphic Exploit Code with Static Analysis Resistant Technique   Dae Won Kim   International Conference on Communications (ICC) 2009, pp.1-6 0
Journal
2009 Validation Methods of Suspicious Network Flows for Unknown Attack Detection   Ik Kyun Kim   International Journal of Computers, v.1, no.3, pp.104-114
Conference
2009 A Case Study of Unknown Attack Detection Against Zero-day Worm in the HoneyNet Environment   Ik Kyun Kim   International Conference on Advanced Communication Technology (ICACT) 2009, pp.1715-1720
Conference
2008 An Architecture of Unknown Attack Detection System against Zero-day Worm   Ik Kyun Kim   International Conference on Applied Computer Science (ACS) 2008, pp.205-211
Journal
2008 Tracing Stored Program Counter to Detect Polymorphic Shellcode   Dae Won Kim   IEICE Transactions on Information and Systems, v.E91-D, no.8, pp.2192-2195 3
Journal
2008 Executable Code Recognition in Network Flows Using Instruction Transition Probabilities   Ik Kyun Kim   IEICE Transactions on Information and Systems, v.E91-D, no.7, pp.2076-2078 2
Conference
2008 Fast Static Analysis Method to Detect Polymorphic Worm   김대원   한국통신학회 종합 학술 발표회 (하계) 2008, pp.229-232
Conference
2008 Function Call Mechanism Based Executable Code Detection for the Network Security   Dae Won Kim   International Symposium on Applications and the Internet (SAINT) 2008, pp.62-67 3
Journal
2008 The Recent Trends of Polymorphic Shellcodes Detection Technologies   김대원   전자통신동향분석, v.23, no.1, pp.145-152
Journal
2008 신종 사이버 공격 탐지 및 차단을 위한 인프라 구축 프로젝트   김대원   주간기술동향, v.1329, pp.1-12
Conference
2007 A Practical Approach for Detecting Executable Codes in Network Traffic   Ik Kyun Kim   Asia-Pacific Network Operations and Management Symposium (APNOMS) 2007 (LNCS 4773), v.4773, pp.354-363 1
Conference
2006 Hardware Supports for Network Traffic Anomaly Detection   Dae Won Kim   International Conference on Internet Computing and Conference on Computer Games Development (ICOMP) 2006, pp.1-5
Journal
2006 네트워크 보안을 위한 공격 분류법   김대원   주간기술동향, v.1249, pp.1-13
Conference
2005 Low-power multimedia scheduling using output pre-buffering   Bae Geuntae   International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) 2005, pp.1-8 5