생몰정보
소속
직위
직업
활동분야
주기
서지
국회도서관 서비스 이용에 대한 안내를 해드립니다.
검색결과 (전체 1건)
원문 있는 자료 (1) 열기
원문 아이콘이 없는 경우 국회도서관 방문 시 책자로 이용 가능
목차보기더보기
표제지
Programme
목차
Opening remark / Yong-Kyung Lee 6
Welcoming remark / Jae-hee Jeon 10
주제발표 1. Above the Clouds: A Berkeley View of Cloud Computing / Anthony D. Joseph 14
BIOGRAPHY 16
ABSTRACT 17
Everyone Has Lots of Data to Process! 18
RAD Lab Mission ('05-'11) 19
Cloud as Major Enabler 19
Cloud Computing: True Utility 20
Economics of Cloud Users 20
Economics of Cloud Providers 22
Cloud Security Risks 22
Split Security Responsibilities 23
Physical Security 23
Shared Computing Infrastructure Risks 24
Securing Data in the Cloud 24
Stepping Stone Compromise 25
Advanced Persistent Threat Risk 25
Summary 26
주제발표 2. Online Privacy in the Age of Targeted Advertising / Larry Rohrbough 28
BIOGRAPHY 30
ABSTRACT 31
Motivation 32
Evolution of the Web 33
Evolution of Web Tracking 35
TRUST Studies - UC Berkeley 36
TRUST Studies - Stanford 37
Solutions: Policy / Standards / Legal 39
Technical Solution 39
Going Forward... 40
주제발표 3. Comparing Korean and US Cyber Security Infrastructure / Yongdae Kim 42
BIOGRAPHY 44
ABSTRACT 45
2010 ~ 2011: Security Breaches Everywhere 46
Security Breaches: Goals 47
Security Breaches: Main Tools (Reports) 47
Questions 48
A Few Possible Reasons 48
System/Security Admin in US Univs 49
System/Security Admin in US Company 49
System/Security Admin in US Major Bank 50
Some More Details 50
Spear Phishing (Targeted Phishing) 51
Examples of Spear Phishing 51
APT and Insider Misuse 53
Questions and Reasons Revisited 54
주제발표 4. Towards a Theory of High Confidence Networked Control Systems: Action Webs / S. Shankar Sastry 56
BIOGRAPHY 58
ABSTRACT 60
Motivation: Cybersecurity : Sensor networks & Networked Control Systems (NCS) NCS vulnerabilities 62
The swarm at the edge of the cloud 62
Ubiquitous instrumentation 63
Sensor webs everywhere 63
Widely deployed in critical infrastructures 64
Societal cyber-physical systems 64
Action Webs 65
Challenges for Action Webs 65
Cyber-attacks to NCS 66
NCS security concerns 66
Previous work in WSN security 67
Previous work in security is not enough 67
Cybersecurity for NCS 68
Cybersecurity for NCS: three problems 68
Cybersecurity for NCS 69
Threat assessment 69
Gignac water canal network 70
Gignac canal network 70
Reported attacks on water SCADA systems 71
Regulatory control of canal pools 71
Defender and attacker models 72
Cyber-attack on the Avencq canal pool 72
Cyber-attacks on NCS 73
Attack diagnosis 74
Attacks on supervisory control layer 74
Flow model 75
Finite-dimensional [approximate] model 75
State Estimation 76
Diagnosis scheme for unauthorized withdrawals 76
Diagnosis of unauthorized withdrawals: no attack 77
Attack diagnosis: upstream level sensors hacked 77
Attack diagnosis: downstream level sensors hacked 78
Security implications 78
Attack diagnosis for [other] SCADA systems 79
Resilient control 79
Attacks on regulatory control layer 80
Attack model: switching system of PDEs 80
Switching attack: stability 81
Switching attack: characterization of system stability 81
Interdependent security (IDS) & incetives to secure 82
Interdependent NCS 82
Interdependent failure probabilities 83
Multiplayer game with interdependent security 83
Increasing and decreasing incentives to secure 84
Individual optima [Nash equilibria] and social optima 84
Conclusion and future research 85
Economics of NCS security and reliability 86
NCS security experimentation 86
Towards a theory of high confidence NCS: Action Webs 87
주제발표 5. Computer Privacy Risks: Snooping on Keyboards / Doug Tygar 88
BIOGRAPHY 90
ABSTRACT 91
Keyboard Acoustic Sniffing 93
Acoustic Information in Typing 93
Previous Work vs. Our Approach 94
Key Observation 94
Sound of a Keystroke 95
Overview 95
Feature Extraction 96
Cepstrum vs. FFT 96
Unsupervised Learning 97
Bi-grams of Characters 98
Language Model Correction 98
Word Tri-grams 99
Two Copies of Recovered Text 99
Feedback-based Training 100
Experiment 101
Limitations of Our Experiments 103
Defenses 104
Summary 104
Overview of the Trust Center 106
TRUST Overview 109
TRUST Research 110
TRUST Education and Outreach 111
TRUST Knowledge Transfer 112
TRUST Human Resource Development 113
TRUST Science of Security 114
Summary 118
Panel 120
1. Sehun Kim 120
2. Hongsun Kim 124
[뒷표지] 127
원문구축 및 2018년 이후 자료는 524호에서 직접 열람하십시요.
도서위치안내: / 서가번호:
우편복사 목록담기를 완료하였습니다.
* 표시는 필수사항 입니다.
* 주의: 국회도서관 이용자 모두에게 공유서재로 서비스 됩니다.
저장 되었습니다.
로그인을 하시려면 아이디와 비밀번호를 입력해주세요. 모바일 간편 열람증으로 입실한 경우 회원가입을 해야합니다.
공용 PC이므로 한번 더 로그인 해 주시기 바랍니다.
아이디 또는 비밀번호를 확인해주세요