References
- "공급망 공격 사례 분석 및 대응 방안," KISA, 2019-KA-T02, 2019.
- "Operation ShadowHammer," Kaspersky, Mar. 2019. https://securelist.com/operation-shadowhammer/89992
- OndrejVlckk, "CCleaner APT Attack: A Technical Look Inside," RSAConference2018.
- "The Untold Story of NotPetya, the Most Devastating Cyberattack in History," Wired, Oct. 2019. https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/
- "2017 cyberattacks on Ukraine," Wikipedia, Oct. 2019. https://en.wikipedia.org/wiki/2017_cyberattacks_on_Ukraine
- "ShadowPad in corporate networks," Kaspersky, Aug. 2017. https://securelist.com/shadowpad-in-corporatenetworks/81432/
- "Supply Chain Risks for Information and Communication Technology," Cybersecurity and Infrastructure Security Agency, Dec. 2018. https://www.cisa.gov/sites/default/files/publications/19_0424_cisa_nrmc_supply-chain-risks-forinformation-and-communication-technology.pdf
- "The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies," Bloomberg Businessweek, Oct. 2018. https://www.bloomberg.com/news/features/2018-10-04/the-bighack-how-china-used-a-tiny-chip-to-infiltrate-america-stop-companies
- "Planting Tiny Spy Chips in Hardware Can Cost as Little as $200," Wired, Oct. 2019. https://www.wired.com/story/plantspy-chips-hardware-supermicro-cheap-proof-of-concept/
- 박재현, 김승주, "정형 기법을 이용한 하드웨어 AES 모듈 백도어 탐색 연구," 한국정보보호학회 논문지, 제29권 제4호, 2019. 8.
- 김동원, 한근희, 전인석, 최진영, "자동차 공급망 위험관리(ASCRM) 방안 연구," 한국정보보호학회 논문지, 제25권 제4호, 2015. 8.
- Trust-Hub. https://trust-hub.org
- Prashast Srivastava, Hui Peng, Jiahao Li, Hamed Okhravi, Howard Shrobe, Mathias Payer, "FirmFuzz: Automated IoT Firmware Introspection and Analysis," Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019. 11.
- The Firmware Analysis and Comparison Tool (FACT). https://github.com/fkie-cad/FACT_core