References
- www.kisa.or.kr/uploadfile/201412/201412301124130506.pdf
- 손승우, 박장혁, 문수미, "사물인터넷 사업자를 위 한 정보보안 법률의 개선 방안 연구," LAW REVIEW, 제57권, 제1호, pp.181-215, 2016(2).
- 이동혁, 박남제, "IoT 기기의 보안성 확보를 위한 제도적 개선방안," 정보보호학회논문지, 제27권, 제3호, pp.607-615, 2017(1). https://doi.org/10.13089/JKIISC.2017.27.3.607
- http://www.kisa.or.kr/public/laws/lawsTrend_ List.jsp
- http://www.dooit.co.kr/survey/report/index/182097
- 문해은, 곽성현, 장격익, 곽기용, 2016년 국내외 사이버 위협정보 심층분석 연구, KISA 연구 보고서, 2016.
- https://iot.ieee.org/images/files/pdf/iot- developer- survey-2016-report-final.pdf
- http://www.gartner.com/document/2625419?ref =QuickSearch&sthkw=G00259115
- Hyungon Moon, Hojoon Lee, Ingoo Heo, Kihwan Kim, Yunheung Paek, and Byunghoon Kang, "Detecting and preventing kernel rootkit attacks with bus snooping," IEEE Transactions on Dependable and Secure Computing, Vol.14, No.2, pp.145-157, 2017(4). https://doi.org/10.1109/TDSC.2015.2443803
- Eugene Rodionov, Alexander Matrosov, and David Harley, "Bootkits: Past, Present and Future," VB Conference, 2014.
- 공희경, 구혜경, 조현웅, 강지성, IoT 디바이스 보안 인증 기반 연구, KISA 연구보고서, 2015.
- http://www.tta.or.kr/data/ttas_view.jsp?totalSu =758&by=desc&order=publish_date&rn=1&pk_n um=TTAK.KO-12.0298&nowSu=295
- https://www.kisa.or.kr/public/laws/laws3_ View.jsp?cPage=1&mode=view&p_No=259&b_N o=259&d_No=80&ST=&SV=
- https://www.trustedcomputinggroup.org/wp- content/uploads/TPM-Rev-2.0-Part-1-Architec ture-01.38.pdf
- https://trustedcomputinggroup.org/tcg-software -stack-tss-specification/
- K. Dietrich and J. Winter, "Secure boot revisited," In Young Computer Scientists, ICYCS 2008, The 9th International Conference for IEEE., pp.2360-2365, 2008(11).
- https://www.trustedcomputinggroup.org/wp- content/uploads/TCG_PCClientImplementation_ 1-21_1_00.pdf
- R. Sailer, X. Zhang, T. Jaeger, and L. Van Doorn, "Design and Implementation of a TCG- based Integrity Measurement Architecture," USENIX Security Symposium, pp.223-238, 2004(8).
- S. Glass, "Verified Boot in Chrome OS and how to make it work for you," Embedded Linux Conference Europe., 2013(10).
- Henk C. A. van Tilborg and Sushil Jajodia, Encyclopedia of Cryptography and Security, Springer US, 2011.
- L. Badger, D. F. Sterne, D. L. Sherman, K. M. Walker, and S. A. Haghighat "Practical domain and type enforcement for UNIX," Security and Privacy, Proceedings 1995 IEEE Symposium on IEEE, pp.66-77, 1995.
- D. E. Bell and J. L. Leonard, "Secure computer systems: Mathematical foundations," No.MTR- 2547-VOL-1, MITRE CORP BEDFORD MA, 1973.
- 변창우, 박석, "비밀성와 무결성을 보장하는 역할기반 접근제어모델," 정보호호학회논문지, 제15권, 제3호, pp.13-29, 2005(6).
- F. Mayer, K. Macmillan, and D. Caplan, SELinux by Example, Prentice Hall, 2006.
- https://www.openssl.org/
- https://www.ecryptfs.org/
- http://seed.kisa.or.kr