사이버 보안/사이버전과 북한 소프트웨어

북한 SW 및 사이버 작전 연구 자료

xdots 2024. 5. 10. 04:50

 

1. Dongsu Kang, “Bridging South and North Korea,“ RINSA Forum, Korea National Defense University, RINSA, Vol.64, pp.5-8, 2019.

2019 Bridging South and North Korea in cyberspace.pdf
0.15MB

 

2. Dongsu Kang, "An Analysis of North Korea’s Software and Patent," The the thesis Collection of KNDU, Korea National Defense University, Vol.27, No.2, pp.105-128, 2019.

3. Chanju Park, Dongsu Kang, “A DOM-Based Fuzzing Method for Analyzing Seogwang Document Processing System in North Korea,” KIPS Trans. Comp. and Comm. Sys. Vol.8, No.5, pp.119-126, 2019. (in Korean)

4. Guesub Hwang, Dongsu Kang, “An Analysis of Intrusion Detection Rule of Redstar 3.0 in North Korea,” KIISE Transaction on Computing Practice, KIISE, Vol.27, No.1, pp.48-54, 2021. (in Korean)

5. Guesub Hwang, Dongsu Kang, “An Analysis of Hiding Technique Using RedStar 3.0 Watermarking,” Journal of Military Science and Technology Studies, Vol.13. No.1, pp.1-10. 2020.(in Korean)

6. HY Yoon, Dongsu Kang, “The Trend of North Korea's Information Technology Using Patent Information Analysis,” Journal of Military Science and Technology Studies, Vol.13. NO.2, pp.35-43. 2020.(in Korean)

7. Jihee Nam, Dongsu Kang, “Fuzzing the ODT File of North's Sogwang Office System using Feture Selection”, Journal of Military Science and Technology Studies, Vol.12. No.2, pp.1-10. 2019.(in Korean)

8. Kihun Park and Dongsu Kang, “A security vulnerability analysis of North Korea OS Red Star,” Proceedings of Korea Software Congress, KIISE, pp.146-148, 2017.(in Korean)

9. Junhyeong Choi, Dongsu Kang, “Analysis File Format of Seogwang Document Processer3.0 in North Korea,” Proceeding of the Korea Information Processing Society, Vol.26, No.1, pp.335-338, 2019. (in Korean)

10. Jihee Nam, Dongsu Kang, “Analysis of ODT File Fuzzing Testcase in North Korea using Feature Selection Method,” Proceeding of the Korea Information Processing Society, Vol.26, No.1, pp. 324-327, 2019. (in Korean)

11. Guesub Hwang, Dongsu Kang, “An Image File Hiding Technique Using Watermarking of the Red Star Operating System,” KIISE Transaction on Computing Practice, KIISE, Vol.27, No.5, 2021.

12. 김도현, 강동수, 북한 사이버/전자전 능력 분석 및 평가, 전투발전요소(DOTMLPF-P) 및 SWOT 분석을 중심으로, 안보군사학연구, 135-160, 2022.

2023 북한 사이버전자전 능력 분석 및 평가(12월).pdf
6.48MB