CS

    [논문 리뷰] SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh

    [논문 리뷰] SoftTRR: Protect Page Tables against Rowhammer Attacks using Software-only Target Row Refresh

    Authors: Zhi Zhang, CSIRO’s Data61, Australia; Yueqiang Cheng, NIO Security Research; Minghua Wang, Baidu Security; Wei He and Wenhao Wang, State Key Laboratory of Information Security, Institute of Information Engineering, CAS and University of Chinese Academy of Sciences; Surya Nepal, CSIRO’s Data61, Australia; Yansong Gao, Nanjing University of Science and Technology, China; Kang Li, Baidu Se..

    [논문 리뷰] Drammer: Deterministic Rowhammer Attacks on Mobile Platforms

    [논문 리뷰] Drammer: Deterministic Rowhammer Attacks on Mobile Platforms

    Authors: Victor van der Veen (Vrije Universiteit Amsterdam), Yanick Fratantonio, Martina Lindorfer (UC Santa Barbara), Daniel Gruss, Clementine Maurice (TU Graz), Giovanni Vigna (UC Santa Barbara), Herbert Bos, Kaveh Razavi and Cristiano Giuffrida (Vrije Universiteit Amsterdam) Journal/Conference: In Proceeding of the 23rd ACM Conference on Computer and Communications Security Source: https://dl..

    [논문 리뷰] Mobile Traffic Forecasting for Network Slices: A Federated-Learning Approach

    [논문 리뷰] Mobile Traffic Forecasting for Network Slices: A Federated-Learning Approach

    Authors: H. P. Phyu, D. Naboulsi and R. Stanica, Journal/Conference: 2022 IEEE 33rd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Kyoto, Japan, 2022, pp. 745-751 Source: https://ieeexplore.ieee.org/document/9977882 Presentation meterials: Abstract Network slicing is one of the cornerstones for next-generation mobile communication systems. Specificall..

    [논문 리뷰] L^2 5GC: A Low Latency 5G Core Network Based on High-Performance NFV Platforms

    [논문 리뷰] L^2 5GC: A Low Latency 5G Core Network Based on High-Performance NFV Platforms

    Authors: Jain, Vivek and Chu, Hao-Tse and Qi, Shixiong and Lee, Chia-An and Chang, Hung-Cheng and Hsieh, Cheng-Ying and Ramakrishnan, K. K. and Chen, Jyh-Cheng Journal/Conference: In Proceedings of the ACM SIGCOMM 2022 Conference (SIGCOMM '22). Association for Computing Machinery Source: https://dl.acm.org/doi/10.1145/3544216.3544267 Presentation materials: Abstract Cellular network control proc..

    [논문 리뷰] Quick Block Transport System for Scalable Hyperledger Fabric Blockchain Over D2D-Assisted 5G networks

    [논문 리뷰] Quick Block Transport System for Scalable Hyperledger Fabric Blockchain Over D2D-Assisted 5G networks

    Authors: R. H. Kim, H. Noh, H. Song and G. S. Park. Journal/Conference: IEEE/ACM Transactions on Network and Service Management, 2022 Source: https://ieeexplore.ieee.org/document/9585564 Presentation materials: Abstract: This paper presents a quick block transport system for scalable Hyperledger Fabric (HLF) blockchain over device-to-device (D2D)-assisted 5G networks. The objective of the propos..

    [논문 리뷰] ProGraph: Robust Network Traffic Identification With Graph Propagation

    [논문 리뷰] ProGraph: Robust Network Traffic Identification With Graph Propagation

    Authors: W. Li, X. -Y. Zhang, H. Bao, H. Shi and Q. Wang Journal/Conference: IEEE/ACM Transactions on Networking, 2022 Source: https://ieeexplore.ieee.org/document/9933044 Presentation materials: Abstract Network traffic identification is critical for effective network management. Existing methods mostly focus on invariant network environments with stable attribute distributions. Unfortunately, ..

    타원곡선암호 연산 파이썬 구현(ECC, P-192)

    Implementing Elliptic Curve Cryptography operation in Python on the Curve P-192 P-192 곡선 파라미터 선언 # define P-192 parameters p = 2 ** 192 - 2 ** 64 - 1 a = -3 b = 0x64210519E59C80E70FA7E9AB72243049FEB8DEECC146B9B1 n = 0xFFFFFFFFFFFFFFFFFFFFFFFF99DEF836146BC9B1B4D22831 gx = 0x188DA80EB03090F67CBF20EB43A18800F4FF0AFD82FF1012 gy = 0x07192B95FFC8DA78631011ED6B24CDD573F977A11E794811 WeierStrass Form de..

    [컴퓨터 보안] 수업 필기

    [컴퓨터 보안] 수업 필기

    CIA와 접근제어 DLP와 소인수분해 문제 & 고전암호 유한체와 AES block cipher Block Cipher Mode와 Stream Cipher 웹 해킹과 Dos 공개키 (RSA, Diffie-Hellam, Elgamal, ECC) Hash Function과 MAC 전자서명과 인증서 네트워크, 시스템 보안 & 보안장비, 솔루션 AI 보안 & 블록체인