Acknowledgement
이 논문은 2021학년도 홍익대학교 학술연구진흥비에 의하여 지원되었음.
References
- P. Grubbs, T. Ristenpart, and V. Shmatikov, "Why your encrypted database is not secure," Proc. 16th workshop Hot Topics Operating Syst., pp. 162-168, May, 2017.
- M.-S. Lacharite, B. Minaud, and K. G. Paterson, "Improved reconstruction attacks on encrypted data using range query leakage," Proc. IEEE Symp. Security and Privacy, pp. 297-314, 2018.
- N. Singh and P. Tiwari,(2022). "SQL Injection Attacks, Detection Techniques on Web Application Databases," Rising Threats in Expert Applications and Solutions, Lecture Notes in Networks and Systems, Vol 434, PP.387-394, 2022.
- P. Grubbs, R. McPherson, M. Naveed, T. Ristenpart, and V. Shmatikov, "Breaking web applications built on top of encrypted data," Proc. ACM SIGSAC Conf. Comput. Commun. Security, pp. 1353-1364, Oct. 2016.
- F. B. Durak, T. M. DuBuisson, and D. Cash, "What else is revealed by order-preserving encryption?," Proc. ACM SIGSAC Conf. Comput. Commun. Security, pp. 1155-1166, Oct. 2016.
- Microsoft, "Always Encrypted (Database Engine)," http://docs.microsoft.com/en-us/sql/relational-databases/security/encryption/always-encrypted-database-engine?view=sql-server2017. (accessed Oct., 18, 2022).
- G. D. Samaraweera, J. M. Chang, "Security and Privacy Implications on Database Systems in Big Data Era: A Survey," IEEE Tr. on Knowledge and Data Engineering, Vol. 33, No. 1, pp. 239-258, Jan. 2021. https://doi.org/10.1109/TKDE.2019.2929794
- C. Priebe, K. Vaswani, and M. Costa, "EnclaveDB: A Secure Database using SGX," Proc. IEEE Symp. Security and Privacy, pp. 264-278, San Francisco, CA, USA, May, 2018.
- O. Avellaneda, A. Bachmann, A. Barbir, J. Brenan, P. Dingle, K. H. Duffy, E. Maler, D. Reed, and M. Sporny, "Decentralized Identity: Where Did It Come From and Where Is It Going?," IEEE Communications Standards Magazine, Vol. 3, No. 4, pp. 10-13, Dec. 2019.
- P. Markert, D. V. Bailey, M. Golla, M. Durmuth, A. J. Aviv, "This PIN Can Be Easily Guessed: Analyzing the Security of Smartphone Unlock PINs," Proc. IEEE Symp. Security and Privacy, pp. 286-303, San Francisco, CA, USA, May, 2020.
- S. Garg and N. Baliyan, "Comparative analysis of Android and iOS from security viewpoint," Computer Science Review, Vol. 40, pp. 1-13, May, 2021.
- J. F. Brown, S. Hossain, and L. Lancor, "Quad Swipe Pattern: A New Point-of-Entry Security Measure for Smartphone Users," IEEE Access, Vol. 9, pp. 160622-160634, Dec. 2021. https://doi.org/10.1109/ACCESS.2021.3132767
- S. F. Verkijika, "Understanding smartphone security behaviors : an extension of the protection motivation theory with anticipated regret," Computers & Security, Vol. 77, pp. 860-870, Aug. 2018. https://doi.org/10.1016/j.cose.2018.03.008