현대의 보안부팅 개발 방식 분석: 플랫폼 환경을 중심으로

논문상세정보

' 현대의 보안부팅 개발 방식 분석: 플랫폼 환경을 중심으로' 의 참고문헌

  • iOS Security: iOS 12.3
  • https://www.wired.com/story/ios-jailbreak-new/
  • https://www.welivesecurity.com/2018/09/27/l ojax-first-uefi-rootkit-found-wild-courtesy-se dnit-group/
  • https://www.slashgear.com/apple-t2-chip-co nfirmed-to-have-kill-switch-for-diy-repairs-12553488/
  • https://www.microsoft.com/security/blog/2017/06/27/new-ransomware-old-techniques-pety a-adds-worm-capabilities/
  • https://techcommunity.microsoft.com/t5/Win dows-Hardware-Certification/Microsoft-UEFICA-Signing-policy-updates/ba-p/364828
  • https://source.android.com/security/verifiedboot
  • https://source.android.com/devices/architecture
  • https://news.joins.com/article/23472884
  • https://lwn.net/Articles/447381/
  • https://github.com/Project-Olympus
  • https://encyclopedia.kaspersky.com/glossary/r ootkit/
  • https://encyclopedia.kaspersky.com/glossary/b ootkit/
  • https://en.wikipedia.org/wiki/GNU_GRUB
  • https://docs.microsoft.com/ko-kr/windows/se curity/threat-protection/intelligence/virus-init iative-criteria
  • https://docs.microsoft.com/ko-kr/windows-har dware/drivers/install/elam-driver-requirements
  • https://docs.microsoft.com/ko-kr/windows-har dware/drivers/install/early-launch-antimalware
  • https://docs.fedoraproject.org/en-US/Fedora/18/html/UEFI_Secure_Boot_Guide/sect-UEFI_S ecure_Boot_Guide-Implementation_of_UEFI_S ecure_Boot-Shim.html
  • https://appleinsider.com/articles/19/04/09/a pples-t2-chip-makes-a-giant-difference-in-vi deo-encoding-for-most-users
  • https://android-developers.googleblog.com/2014/07/knox-contribution-to-android.html
  • Zynq-7000 SoC Technical Reference Manual
  • Whitepaper:Samsung Knox Security Solution
  • Unified Extensible Firmware Interface Specification Version 2.3.1 Errata C
    UEFI [2012]
  • Trusted Execution Environment : What It is, and What It is Not
    M. Sabt [2015]
  • Too young to be secure: Analysis of UEFI threats and vulnerabilities
    V. Bashun [2013]
  • Studying spamming botnets using Botlab
    J. P. John [2009]
  • Secure Boot of Zynq-7000 SoC (XAPP1175)
  • Rootkits and Bootkits: Reversing Modern Malware and Next Generation Threats
    A. Matrosov [2019]
  • Project Cerberus Security Architecture Overview Specification
  • IoT 보안 요구사항 및 보안 운영체제 기반 기술 분석
    고재용 [2018]
  • Computer-Mediated Marketing Strategies : Social Media and Online Brand Communities
    G. Bowen [2014]
  • Comprehensive Analysis and Detection of Flash-Based Malware
  • Apple T2 Security Chip
  • ARM Security Technology: Building a Se cure System using TrustzoneⓇ Technology
  • A secure and reliable bootstrap architecture