KSC 2017
Current Result Document : 2 / 2
ÇѱÛÁ¦¸ñ(Korean Title) |
¹«±âü°è ³»ÀåÇü ¼ÒÇÁÆ®¿þ¾î º¸¾È¾àÁ¡ ½Äº° ¹æ¹ý·Ð |
¿µ¹®Á¦¸ñ(English Title) |
Security Weakness Identification Methodology for Weapon System Software |
ÀúÀÚ(Author) |
ÀåÈñÁø
±èÁø±¹
Á¤½ÂÈÆ
±èÈñµ¿
±èÇö¼÷
Heejin Jang
Jingoog Kim
Seounghoon Jung
Heedong Kim
Hyeonsook Kim
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 44 NO. 02 PP. 0149 ~ 0151 (2017. 12) |
Çѱ۳»¿ë (Korean Abstract) |
¹«±âü°èÀÇ ¼ÒÇÁÆ®¿þ¾î ÀÇÁ¸¼ºÀÌ È®´ëµÊ¿¡ µû¶ó ¼ÒÇÁÆ®¿þ¾î º¸¾È Ãë¾àÁ¡À» ÀÌ¿ëÇÑ ¹«±âü°è °ø°Ý °¡´É¼ºµµ ³ô¾ÆÁö°í ÀÖ´Ù. ¼ÒÇÁÆ®¿þ¾î ¶óÀÌÇÁ»çÀÌŬÀÇ °³¹ß ´Ü°è¿¡¼ º¸¾È¾àÁ¡À» Áø´ÜÇÏ°í Á¦°ÅÇÏ´Â °ÍÀº ¿î¿ë´Ü°è¿¡¼ º¸¾È Ãë¾àÁ¡À» Á¦°ÅÇÏ´Â °Íº¸´Ù ºñ¿ë ´ëºñ Å« È¿°ú¸¦ ±â´ëÇÒ ¼ö ÀÖ´Ù. ±×·¯³ª ÇöÀç ¹«±âü°è ¼ÒÇÁÆ®¿þ¾îÀÇ ÁÖ¿ä º¸¾È¾àÁ¡Àº ½Äº°µÇÁö ¾ÊÀº »óȲÀ̹ǷΠº¸¾È¾àÁ¡ Áø´Üµµ±¸¸¦ »ç¿ëÇÏ´õ¶óµµ Á¤È®ÇÑ Áø´ÜÀ» ±â´ëÇϱâ´Â ¾î·Æ´Ù. º» ³í¹®¿¡¼´Â ¹«±âü°è ³»ÀåÇü ¼ÒÇÁÆ®¿þ¾îÀÇ ÁÖ¿ä º¸¾È¾àÁ¡ ¸ñ·ÏÀ» ½Äº°Çϱâ À§ÇÑ ¹æ¹ý·ÐÀ» Á¦¾ÈÇÑ´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
|
Å°¿öµå(Keyword) |
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|