References
- J.W.Park and Y.S,Park, "An automatic detection scheme of anti-debugging routines to the environment for analysis," Proc. Control Conference, p.2, 2014.
- H.M.Kwak, T.H.Lee, G.N.Kim, J.W.Cho and K.H.Lee, "A Scheme for Avoidance through Anti-debugging Program", The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.55-57, 2019.
- p3ngdump's study blog. p3ngdump, June. 15. 2016, "https://p3ngdump.tistory.com/56".
- H.N.Kim, "Real-time hybrid analysis based on multiple profile for prevention of malware,"Hongik University Graduate School: Department of Information Security, 2014.
- JH.Choi, K.H.Lee and S.H.Yun, "Abnormal Process Detection Using Blockchain", The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.67-68, 2019.
- E.G.Hong, S.J.Lee and S.H.Seo, "Blockchain Technology Trends for the Internet of Things", Journal of Information Security, Vol.9, No.1, pp.38-46, 2018.
- J.H.Choi, K.H.Lee and S.H.Yun, "Abnormal Process Detection Using Blockchain", The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.67-68, 2019.
- H.Y.Kim, "Analysis of Security Threats and Countermeasures on Blockchain Platforms," Korean Institute of Information Technology, Vol.16, No.5, pp.103-112, 2018. https://doi.org/10.14801/jkiit.2018.16.5.103
- H.J.Chu, I.H.Song and B.G.Choi, "A Decentralized Test Management Tool Based on Blockchain Technique," The Korean Institute of Information Scientists and Engineers, Vol.25, No.7, pp.321-328, 2019.
- J.H.Hong, K.H.Lee and S.H.Yun, "A Scheme for ECU Application Technique using Blockchain", The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.34-35, 2019.
- T.Hardjono and N.Smith. "Cloud-based commissioning of constrained devices using permissioned blockchains." IoTPTS '16 Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security. ACM, 2016.
- J.H.Yang and K.H.Lee, "A Scheme for Application of Internet of Things and Blockchain Technology", The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.75-76, 2019.
- J.T.Kim, J.H.Kho, M.S.Hong, C.W Son, B.Park, D.W.Lee and G.Lee "A Study on Intrusion Protection Techniques against Linux Kernel Backdoor", The Journal of The Institute of Webcasting, Internet Television and Telecommunication, Vol.9, No.3, pp.201-207, 2009.
- S.J.Park, G.S.Go, J.H.Cho and, K.H.Lee, "A Scheme for Anomaly Process Detection Using Blockchain", The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.24-25, 2019.
- Wikipedia, "chkrootkit", https://ko.wikipedia.org/wIki/Chkrootkit
- J.H.Hong, J.W.Kim, C.J.Kim and, K.H.Lee, "Security Techniques for Various Hacking Using Kali-Linux", The Korea Internet of Things Society Comprehensive Conference 2019, Vol.4, No.1, pp.61-62, 2019.