• Àüü
  • ÀüÀÚ/Àü±â
  • Åë½Å
  • ÄÄÇ»ÅÍ
´Ý±â

»çÀÌÆ®¸Ê

Loading..

Please wait....

Çмú´ëȸ ÇÁ·Î½Ãµù

Ȩ Ȩ > ¿¬±¸¹®Çå > Çмú´ëȸ ÇÁ·Î½Ãµù > Çѱ¹Á¤º¸Åë½ÅÇÐȸ Çмú´ëȸ > 2017³â Ãß°èÇмú´ëȸ

2017³â Ãß°èÇмú´ëȸ

Current Result Document :

ÇѱÛÁ¦¸ñ(Korean Title) IoT ´Ü¸»±â¿¡¼­ Áõ°ÅÃßÃâ Æ÷·»½Ä ¿¬±¸
¿µ¹®Á¦¸ñ(English Title) Extract of evidence on the IoT Device
ÀúÀÚ(Author) ¼ÛÁø¿µ   ¹Ú´ë¿ì   Jin-young Song   Dea-woo Park  
¿ø¹®¼ö·Ïó(Citation) VOL 21 NO. 02 PP. 0343 ~ 0345 (2017. 10)
Çѱ۳»¿ë
(Korean Abstract)
IoT ±â¼úÀÇ ¹ß´Þ·Î IoT¿Í ¿¬°èµÈ ´Ü¸»±â°¡ È°¿ëµÇ°í ÀÖ´Ù. ÇÏÁö¸¸ IoT°¡ »çȸ Àü¹Ý¿¡ È°¿ëµÇ¸é¼­ º¸¾È»ç°í°¡ ¹ß»ýÇÏ°í ÀÖ´Ù. IoT º¸¾È »ç°í´Â °³ÀÎÀÇ À§Çè°ú »çȸÀÇ È¥¶õÀ¸·Î ¿¬°áµÉ ¼ö ÀÖ´Ù. º» ¿¬±¸¿¡¼­´Â IoT ½º¸¶Æ®¿öÄ¡ ´Ü¸»±â¿¡¼­ º¸¾È ħÇØ»ç°í°¡ ¹ß»ýÇÑ Áõ°Å¸¦ ÃßÃâÇÑ´Ù. IoT º¸¾È ħÇØ»ç°í ȯ°æÀ» ºÐ¼®ÇÏ°í ¿øº»¼º°ú ¹«°á¼ºÀ» È®º¸Çϱâ À§ÇÑ Hashing ÇÔ¼ö¸¦ ÃßÃâÇÑ´Ù. ±×¸®°í IoT ½º¸¶Æ®¿öÄ¡ ´Ü¸»±â¿¡¼­ Forensic Áõ°Å¸¦ ÃßÃâÇÏ¿© ¿øº»¼º°ú ¹«°á¼ºÀ» °ËÁõÇÏ°í Forensic º¸°í¼­¸¦ ÀÛ¼ºÇÏ¿© ¹ýÀû Áõ°ÅÀÚ·á·Î äÅõǵµ·Ï ¿¬±¸ÇÑ´Ù.
¿µ¹®³»¿ë
(English Abstract)
With the development of IoT technology, terminals connected with IoT are being used. However, security incidents are occurring as IoT is applied to society as a whole. IoT security incidents can be linked to personal risk and social disruption. In this study, we extract the evidence of security breach in IoT device. Analyze IoT security breach environment and extract Hashing function to secure original integrity and integrity. Then, the Forensic evidence is extracted from the IoT security device to verify the integrity of the original and Forensic reports should be written and studied to be used as legal evidence.
Å°¿öµå(Keyword) IoT ´Ü¸» Æ÷·»½Ä   Áõ°Å ÃßÃâ   Memory   Çؿܺм®Åø  
ÆÄÀÏ÷ºÎ PDF ´Ù¿î·Îµå