Project

A Study on the Small Embedded Device Access Vulnerability Analysis

  • Analysis of vulnerabilities in access to commercial small embedded devices
  • Analysis of Open Source Small Embedded Device Access Vulnerabilities
  • Investigate Small Embedded Device Access Vulnerabilities
  • Establishment of Small Embedded Device Access Vulnerability Analysis Environment

  • Study on the Safe Certification and Data Distribution System for Multi-agency CDM Distributed Research Network, Ministry of Health and Welfare

  • Design of public research network infrastructure for quasi-automation of CDM data analysis
  • Design and development of a simple public research network certification protocol and semi-automated analysis code distribution/analysis result inquiry approval system
  • Design and development of logging system and monitoring technology for the management of security breaches and incidents
  • Demonstration and Effectiveness Analysis of the CDM Research Network proposed in conjunction with a partner organization

  • Development of a Cloud-Based Common Data Model Security Management and Operations Network, Ministry of Health and Welfare

  • Developing an Unidentifiable Process for CDM DB for the Cloud
  • Design Cloud DBMS Architecture and Network for CDM
  • Cloud CDM DB is deployed and applied to multiple agencies
  • Development of Certification and Security Module for Cloud CDM SW and DBMS
  • Demonstrate multi-agency distributed network research using cloud CDM DB

  • research report

    2019

    • A Study on the Analysis and Verification of Drones Vulnerabilities Based on Open Source, National Security Research Institute
    • BIOS Protection Mechanism Analysis, National Security Technology Research Institute
    • 1st year of Study on the Safe Certification and Data Distribution System for Multi-agency CDM Distributed Research Network, Ministry of Health and Welfare
    • 1st year of development of common cloud-based data model security management and operational network, Ministry of Health and Welfare

    2018

    • Network-linked S/W Security Threat Analysis Study, National Security Research Institute
    • A Study on the Analysis of System Information for Commercial Drone, National Security Technology Research Institute

    2017

    • Applied S/W Communication Protocol Study, National Security Research Institute
    • Development of System Independent Malicious Code and Vulnerability Detection Technology Using Deep Learning, ITP

    2016

    • A Study on the Software Analysis Technology of Network Interlocking Devices, National Security Research Institute
    • Anomaly detection system through data mining-based web user behavior analysis, Small and Medium Business Administration

    2011

    • Research on how to respond to network breaches in public cloud services, Innogrid Co., Ltd.
    • A Study on the Analysis and Response of Memory Dump Attack Techniques, National Security Research Institute

    2010

    • A Study on the Disability Algorithm for Automatic Analysis of Compressed Malicious Codes, Korea Internet & Security Agency
    • Analysis of Security Vulnerabilities by Cloud Service Architecture Layer, Korea Internet & Security Agency

    2009

    • A Study on the Establishment of Security System in the National Supercomputing System, Korea Advanced Institute of Science and Technology Information
    • Hangulization of network vulnerability check items, Eglu Security Co., Ltd.

    2008

    • A Study on the Penetration Test Model through Kernel-Based Data Analysis, National Security Technology Research Institute
    • Simulation Technology for Virtual Cyber/Defense Systems (Stage 1); Defense Science Research Institute
    • A Study on the Modeling Method of Network Environment, Korea Research Foundation

    2007

    • Research and development on the collection and analysis of log data from a system forensics perspective, Digital Security Co., Ltd.
    • A Study on the Probabilistic Comparative Analysis of Web Application Product Penetration Test Technology, National Security Research Institute

    2006

    • A Study on Comparative Analysis of Web Application Product Penetration Test Technology, National Security Research Institute

    2005

    • Development of Security Protocol for Sensor Network, Korea Electronics and Telecommunications Research Institute
    • Modeling Techniques for Internet Worm Motion and Propagation Characteristics, National Security Research Institute
    • Scalable Multi-tier Patch Distribution Technology, National Security Technology Research Institute

    2003

    • Development of Secure Security Patch Management Framework in Multi-Platform Environments, National Security Research Institute
    • A Study on the Intrusion Detection System on the Network Using the Adaptive Response Theory, Korea University

    2002

    • A Study on the Automated Distribution of Security Patches, National Security Technology Research Institute
    • A Study on the Bypass Attack and Defense of Security Tools, Korea Information Security Agency
    • Content-based video search using the characteristics of biological vision, ICT Research and Promotion Agency
    • Research on Intruders Discriminating Technology for the Activation of the Intelligence Agent, National Security Research Institute