Digital Library
Search: "[ keyword: Vulnerability ]" (20)
Implementation of a Static Analyzer for Detecting the PHP File Inclusion Vulnerabilities
Joon Seon Ahn , Seong Chae Lim The KIPS Transactions:PartA,
Vol. 18, No. 5, pp. 193-204,
Oct.
2011
10.3745/KIPSTA.2011.18.5.193

An Efficient Searching of Vulnerabilities based on a DNS System model using Ptolemy
Seung Hun Shin , Seung Kyu Park , Ki Hyun Jung The KIPS Transactions:PartD,
Vol. 16, No. 6, pp. 921-926,
Dec.
2009
10.3745/KIPSTD.2009.16.6.921

TokenROC: A ROC-Based Evaluation Method for XAI Techniques in Software Vulnerability Token Detection
Jaehong Kim, Sebeom Cheon, Sungmin Han, Sangkyun Lee The Transactions of the Korea Information Processing Society,
Vol. 14, No. 9, pp. 677-686,
Sep.
2025
https://doi.org/10.3745/TKIPS.2025.14.9.677
Keywords: Software Vulnerability Detection, Vulnerable Token Identification, Explainable Artificial Intelligence

Keywords: Software Vulnerability Detection, Vulnerable Token Identification, Explainable Artificial Intelligence
Research on Exploiting Browser Use-After-Free Bugs Triggered by User Interaction
Youngjoo Lee, Byoungyoung Lee The Transactions of the Korea Information Processing Society,
Vol. 14, No. 8, pp. 569-575,
Aug.
2025
https://doi.org/10.3745/TKIPS.2025.14.8.569
Keywords: Web Browser, User Interface, Vulnerability, Attack

Keywords: Web Browser, User Interface, Vulnerability, Attack
A Study on Validation Testing for Input Files of MS Word-Processor
Young Min Yun , Seong Je Cho , Jong Cheon Choi , Hae-Young Yoo The KIPS Transactions:PartC,
Vol. 14, No. 4, pp. 313-320,
Aug.
2007
10.3745/KIPSTC.2007.14.4.313

Methodology of Analyze the Risk Using Method of Determinated Quantity
Joong Gil Park The KIPS Transactions:PartC,
Vol. 13, No. 7, pp. 851-858,
Dec.
2006
10.3745/KIPSTC.2006.13.7.851

Classification of BcN Vulnerabilities Based on Extended X.805
Jong Lim Yoon , Young Ho Song , Byoung Joon Min , Tai Jin Lee The KIPS Transactions:PartC,
Vol. 13, No. 4, pp. 427-434,
Aug.
2006
10.3745/KIPSTC.2006.13.4.427

A Survivability Model of an Intrusion Tolerance System
Bum Joo Park , Kie Jin Park , Sung Soo Kim The KIPS Transactions:PartA,
Vol. 12, No. 5, pp. 395-404,
Oct.
2005
10.3745/KIPSTA.2005.12.5.395

A Study on IP Camera Security Issues and Mitigation Strategies
Seungjin Shin, Jungheum Park, Sangjin Lee KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 3, pp. 111-118,
Mar.
2023
https://doi.org/10.3745/KTCCS.2023.12.3.111
Keywords: IP Camera, hacking, Vulnerability, GoAhead Web Server, Illegal Filming

Keywords: IP Camera, hacking, Vulnerability, GoAhead Web Server, Illegal Filming
Implementing an Intrusion Detection Message Exchange Library for Realtime Interaction between SDMS-RTIR and Heterogeneous Systems
Yu Il Seon , Lee Dong Lyeon , O Eun Sug The KIPS Transactions:PartC,
Vol. 10, No. 5, pp. 565-574,
Oct.
2003
10.3745/KIPSTC.2003.10.5.565
