2014³â µ¿°è Çмú´ëȸ
Current Result Document :
ÇѱÛÁ¦¸ñ(Korean Title) |
ÇÇ½Ì °ø°Ý ´ëÀÀ ±â¹ý ¾ÈÀü¼º ºñ±³ ºÐ¼® |
¿µ¹®Á¦¸ñ(English Title) |
Security Analysis of Phishing Countermeasures |
ÀúÀÚ(Author) |
±è¼Ò¿µ
°ÁöÀ±
±èÀ±Á¤
Soyoung Kim
Jiyoon Kang
Yoonjeong Kim
|
¿ø¹®¼ö·Ïó(Citation) |
VOL 41 NO. 02 PP. 0756 ~ 0758 (2014. 12) |
Çѱ۳»¿ë (Korean Abstract) |
ºÒƯÁ¤ ´Ù¼ö¿¡°Ô ¸ÞÀÏÀ» ¹ß¼ÛÇØ À§ÀåµÈ ȨÆäÀÌÁö¿¡ Á¢¼ÓÇÑ µÚ ÀÎÅÍ³Ý ÀÌ¿ëÀÚµéÀÇ ±ÝÀ¶Á¤º¸ µîÀ» »©³»´Â ½ÅÁ¾»ç±â ¼ö¹ýÀÎ ÇǽÌÀÇ ¾Ç¿µÇâÀÌ Ä¿Áü¿¡ µû¶ó ¸¹Àº ÇÇÇØ »ç·Ê°¡ Áõ°¡ÇÏ°í ÀÖ´Â Ãß¼¼ÀÌ´Ù. ÀÌ¿¡ ´ëÇÑ ´ëÀÀ ¹æ¾ÈÀ¸·Î ´Ù¾çÇÑ ¿¬±¸°¡ ÁøÇàµÇ°í ÀÖ´Ù. º» ³í¹®¿¡¼´Â, ÀÌ Áß PhoolProof, MP-Auth, Varshney ±×¸®°í oPass µîÀÇ °ø°Ý ´ëÀÀ¹æ¾ÈµéÀ» ´ë»óÀ¸·Î, ¼Ò¼È ÇǽÌ, MITB(Man in the Browser), Key Logger, Æнº¿öµå Àç»ç¿ë °ø°Ý¿¡ ´ëÇÑ ¾ÈÀü¼ºÀ» ºñ±³ ºÐ¼®ÇÑ °á°ú¸¦ ±â¼úÇÑ´Ù. º» ¿¬±¸ °á°ú´Â Á» ´õ ¾ÈÀüÇÑ ÇÇ½Ì ¹æ¾È ±¸Ãึ·ÃÀÇ ±â¹ÝÀÌ µÉ °ÍÀ¸·Î ±â´ëµÈ´Ù.
|
¿µ¹®³»¿ë (English Abstract) |
|
Å°¿öµå(Keyword) |
|
ÆÄÀÏ÷ºÎ |
PDF ´Ù¿î·Îµå
|