1. Dongsu Kang, “Bridging South and North Korea,“ RINSA Forum, Korea National Defense University, RINSA, Vol.64, pp.5-8, 2019.
2. Dongsu Kang, "An Analysis of North Korea’s Software and Patent," The the thesis Collection of KNDU, Korea National Defense University, Vol.27, No.2, pp.105-128, 2019.
3. Chanju Park, Dongsu Kang, “A DOM-Based Fuzzing Method for Analyzing Seogwang Document Processing System in North Korea,” KIPS Trans. Comp. and Comm. Sys. Vol.8, No.5, pp.119-126, 2019. (in Korean)
4. Guesub Hwang, Dongsu Kang, “An Analysis of Intrusion Detection Rule of Redstar 3.0 in North Korea,” KIISE Transaction on Computing Practice, KIISE, Vol.27, No.1, pp.48-54, 2021. (in Korean)
5. Guesub Hwang, Dongsu Kang, “An Analysis of Hiding Technique Using RedStar 3.0 Watermarking,” Journal of Military Science and Technology Studies, Vol.13. No.1, pp.1-10. 2020.(in Korean)
6. HY Yoon, Dongsu Kang, “The Trend of North Korea's Information Technology Using Patent Information Analysis,” Journal of Military Science and Technology Studies, Vol.13. NO.2, pp.35-43. 2020.(in Korean)
7. Jihee Nam, Dongsu Kang, “Fuzzing the ODT File of North's Sogwang Office System using Feture Selection”, Journal of Military Science and Technology Studies, Vol.12. No.2, pp.1-10. 2019.(in Korean)
8. Kihun Park and Dongsu Kang, “A security vulnerability analysis of North Korea OS Red Star,” Proceedings of Korea Software Congress, KIISE, pp.146-148, 2017.(in Korean)
9. Junhyeong Choi, Dongsu Kang, “Analysis File Format of Seogwang Document Processer3.0 in North Korea,” Proceeding of the Korea Information Processing Society, Vol.26, No.1, pp.335-338, 2019. (in Korean)
10. Jihee Nam, Dongsu Kang, “Analysis of ODT File Fuzzing Testcase in North Korea using Feature Selection Method,” Proceeding of the Korea Information Processing Society, Vol.26, No.1, pp. 324-327, 2019. (in Korean)
11. Guesub Hwang, Dongsu Kang, “An Image File Hiding Technique Using Watermarking of the Red Star Operating System,” KIISE Transaction on Computing Practice, KIISE, Vol.27, No.5, 2021.
12. 김도현, 강동수, 북한 사이버/전자전 능력 분석 및 평가, 전투발전요소(DOTMLPF-P) 및 SWOT 분석을 중심으로, 안보군사학연구, 135-160, 2022.
'사이버 보안 > 사이버전과 북한 소프트웨어' 카테고리의 다른 글
사이버 취약점 조사/분석 도구 (0) | 2023.11.11 |
---|---|
러시아군 장교 6명 평창올림픽 해킹 혐의로 미국서 기소 (0) | 2023.10.30 |
북한 운영체제 붉은별 RedStar (0) | 2023.10.30 |
미국이 기소한 북한 해커 (0) | 2023.10.30 |
북한 정찰총국(RGB) (0) | 2023.10.29 |