지원사업
학술연구/단체지원/교육 등 연구자 활동을 지속하도록 DBpia가 지원하고 있어요.
커뮤니티
연구자들이 자신의 연구와 전문성을 널리 알리고, 새로운 협력의 기회를 만들 수 있는 네트워킹 공간이에요.
이용수1
국문 요약 ···············································································································11. 서론 ····················································································································22. 관련 연구 ··········································································································42.1. 접촉자 추적 기술 ···················································································42.1.1. 블루투스 기반 중앙집중형 방식 ············································42.1.1.1. ROBERT ······································································52.1.1.2. NTK ··············································································52.1.1.3. BlueTrace ····································································62.1.2. 블루투스 기반 탈중앙형 방식 ················································72.1.2.1. DP-3T ··········································································72.1.2.2. Exposure Notification ···············································72.1.3. 위치정보 기반 방식 ··································································82.1.3.1. KOR 방식 ····································································92.2. 보안 위협 모델링 ·················································································102.2.1. STRIDE ·····················································································102.2.2. LINDDUN ·················································································113. Attack Library 구축 ····················································································133.1. 내부자 위협 ···························································································133.1.1. DUCT 무결성 위배 ································································133.1.2. DUCT 기밀성 위배 ································································133.2. 외부자 위협 ···························································································143.2.1. 릴레이/리플레이 공격 ·····························································143.2.2. 자원 고갈 공격 ········································································143.2.3. Service Server DoS ·······························································153.2.4. 외부자에 의한 거짓 감염 공격 ············································153.2.5. Service Server 가장 공격 ·····················································153.2.6. 블루투스 중간자 공격 ····························································153.2.7. 블루투스 취약점 공격 ····························································163.2.8. 외부자에 의한 Linking 공격 ················································163.2.9. Tracking 공격 ··········································································163.2.10. 어깨너머공격 ··········································································163.3. 사용자 위협 ···························································································173.3.1. Trolling 공격 ···········································································173.3.2. GPS 조작 ··················································································173.3.3. 시스템 시간 조작 ····································································183.3.4. 접촉 가능성 무시 ····································································183.3.5. 사용자에 의한 거짓 감염 공격 ············································184. 접촉자 추적 기술에 대한 보안 위협 모델링 ··········································194.1. 블루투스 기반 중앙집중형 방식 ·······················································194.1.1. 데이터 흐름도 ··········································································194.1.2. STRIDE 보안 위협 분석 ·······················································204.1.3. LINDDUN 보안 위협 분석 ···················································224.2. 블루투스 기반 탈중앙형 방식 ···························································224.1.1. 데이터 흐름도 ··········································································244.1.2. STRIDE 보안 위협 분석 ·······················································244.1.3. LINDDUN 보안 위협 분석 ···················································264.3. 위치정보 기반 방식 ·············································································274.3.1. 데이터 흐름도 ··········································································284.3.2. STRIDE 보안 위협 분석 ·······················································284.3.3. LINDDUN 보안 위협 분석 ···················································305. 접촉자 추적 기술에 대한 평가 기준 제안 및 비교 분석 ····················316. 결론 ··················································································································38참고문헌 ···············································································································39
0