º¸¾È´º½º â°£ 17ÁÖ³âÀ» ÃàÇÏÇÕ´Ï´Ù!!

Home > Àüü±â»ç

2013³â ±Û·Î¹ú º¸¾È ÇÖÀ̽´ ÇÑ´«¿¡ »ìÆ캸±â

ÀÔ·Â : 2013-07-22 02:01
ÆäÀ̽ººÏ º¸³»±â Æ®À§ÅÍ º¸³»±â ³×À̹ö ¹êµå º¸³»±â Ä«Ä«¿À ½ºÅ丮 º¸³»±â ³×À̹ö ºí·Î±× º¸³»±â

27ÀÏ °³ÃֵǴ ºí·¢ÇÞ 2013 °­¿¬À¸·Î ¤¾îº¸´Â ±Û·Î¹ú º¸¾È Æ®·»µå 

À念Áø¡¤À̽ÂÁø ¾¾, iOS ¹× ½º¸¶Æ®TV º¸¾ÈÃë¾àÁ¡ °ü·ÃÇØ °¢°¢ °­¿¬

 

[º¸¾È´º½º ±Ç ÁØ] ¿Ã ÇÑÇØ Àü ¼¼°è°¡ ÁÖ¸ñÇÏ°í ÀÖ´Â º¸¾È Æ®·»µå¿Í ÇÖÀ̽´°¡ µÇ°í ÀÖ´Â º¸¾ÈÃë¾àÁ¡À» ¾Ë°í ½Í´Ù¸é ¾î¶»°Ô ÇØ¾ß ÇÒ±î? 


¾Æ¸¶µµ °¡Àå ºü¸¥ ¹æ¹ýÀº ±× ÇØ °³ÃֵǴ ¼¼°è À¯¼öÀÇ º¸¾È ÄÁÆÛ·±½ºÀÇ °­¿¬ÁÖÁ¦¸¦ »ìÆ캸´Â ÀÏÀÌ ¾Æ´Ò±î ½Í´Ù. ƯÈ÷, ¼¼°è ÃÖ°í ±ÇÀ§¸¦ ÀÚ¶ûÇÏ´Â º¸¾È ÄÁÆÛ·±½ºÀÎ ¡®ºí·¢ÇÞ(blackhat)¡¯¿¡¼­ ÁøÇàµÇ´Â °­¿¬Àº ±Û·Î¹ú ÇÖÀ̽´¸¦ ¹Ý¿µÇÑ ÁÖÁ¦µéÀÌ ¼±Á¤µÇ±â¿¡ Àü ¼¼°è º¸¾ÈÀü¹®°¡µéÀÇ °ü½ÉÀÌ ÁýÁߵȴÙ.


±×·³ ¿À´Â 27ÀϺÎÅÍ 8¿ù 1ÀϱîÁö ¹Ì±¹ ¶ó½ºº£°¡½º ½ÃÀú½º ÆÓ¸®½º È£ÅÚ¿¡¼­ °³ÃֵǴ blackhat USA 2013¿¡¼­´Â ¾î¶² °­¿¬µéÀÌ ÁغñµÅ ÀÖÀ»±î? ¿ä¾àÇغ¸¸é PC¿¡¼­ ½º¸¶Æ®Æù°ú ½º¸¶Æ®TV µîÀÇ ÀÎÅÍ³Ý °¡ÀüÀ¸·Î ¿Å°Ü°¡°í ÀÖ´Â º¸¾ÈÃë¾àÁ¡ À̽´, MDM ¼Ö·ç¼Ç°ú ¾ÆÀÌÆù, ºí·¢º£¸® µîÀÇ ½º¸¶Æ®Æù º¸¾ÈÃë¾à¼º, À©µµ¿ì 8ÀÇ º¸¾È¹®Á¦, ºòµ¥ÀÌÅÍ µî ½Å±â¼úÀ» ÀÌ¿ëÇÑ ¾Ç¼ºÄÚµå ºÐ¼®, ºí·çÅõ½º¡¤Áö±×ºñ¡¤RFID µîÀÇ ¹«¼±º¸¾È ¹®Á¦, ½º¸¶Æ®±×¸®µå µî Àü·Â¸Á º¸¾È, ±×¸®°í ÃÖ±Ù ½º³ëµç »ç°ÇÀ¸·Î ºÒ°ÅÁø »çÀ̹ö°¨½Ã µî ÃÖ±Ù º¸¾ÈÀ̽´¿¡ ´ëÇÑ ³íÀÇ°¡ ÃѸÁ¶ó µÉ °ÍÀ¸·Î º¸ÀδÙ.


¹«¾ùº¸´Ù À̹ø ÄÁÆÛ·±½º¿¡¼­´Â 2¸íÀÇ Çѱ¹ÀÎÀÌ °­¿¬ÀÚ·Î ³ª¼³ ¿¹Á¤À̶ó ´õ¿í °ü½ÉÀÌ ¸ð¾ÆÁö°í ÀÖ´Ù. ¸ÕÀú KAIST Ãâ½ÅÀ¸·Î ÇöÀç ¹Ì±¹ Á¶Áö¾Æ°ø´ë ´ëÇпø ¹Ú»ç°úÁ¤ ÁßÀÎ À念Áø ¾¾°¡ Çб³ µ¿·áµé°ú ÇÔ²² °³¹ßÇÑ ¾ÆÀÌÆù ÇØÅ· ÃæÀü±â¸¦ ½Ã¿¬°ú ÇÔ²² ¼±º¸ÀδÙ.


ÀÌ ÃæÀü±â´Â ¾ÆÀÌÆù¡¤¾ÆÀÌÆÐµå µî iOS¸¦ ±â¹ÝÀ¸·Î ÇÑ ±â±â¿¡ »ç¿ëÀÚ ¸ô·¡ ¾Ç¼º ¼ÒÇÁÆ®¿þ¾î¸¦ ½É¾î ±â±â ³» °³ÀÎÁ¤º¸ µîÀ» Å»ÃëÇÒ ¼ö ÀÖ¾î CNN µî ¿Ü½ÅÀ» ÅëÇØ ÀÌ¹Ì È­Á¦°¡ µÈ ¹Ù ÀÖ´Ù.


ÀÌ¿Í ÇÔ²² ±¹³»¸¦ ´ëÇ¥ÇÏ´Â È­ÀÌÆ®ÇØÄ¿ Áß ÇϳªÀÎ ±×·¹ÀÌÇؽ¬ À̽ÂÁø ¼ö¼®ÄÁ¼³ÅÏÆ®°¡ ÃÖ±Ù º¸±ÞÀÌ È®»êµÇ°í ÀÖ´Â ½º¸¶Æ®TVÀÇ º¸¾ÈÃë¾àÁ¡°ú ½º¸¶Æ®TV ÇØÅ·¿¡ µû¶ó ¹ß»ýÇÒ ¼ö ÀÖ´Â ¿©·¯ °¡Áö ¹®Á¦¿¡ ´ëÇØ ¹ßÇ¥ÇÒ °ÍÀ¸·Î ¾Ë·ÁÁ³´Ù.


´ÙÀ½Àº ¿öÅ©¼ó¿¡¼­ÀÇ ¹ßÇ¥¸¦ Á¦¿ÜÇÑ À̹ø blackhat USA 2013¿¡¼­ ¹ßÇ¥µÇ´Â °­¿¬ÁÖÁ¦ ¹× °­¿¬ÀÚ ¸®½ºÆ®´Ù. °­¿¬ÁÖÁ¦¿¡ ´ëÇÑ Á»´õ ÀÚ¼¼ÇÑ ¼³¸íÀº ÄÁÆÛ·±½º ȨÆäÀÌÁö¿¡¼­ °­¿¬¿ä¾à ÄÚ³Ê (http://www.blackhat.com/us-13/briefings.html)¸¦ ÂüÁ¶ÇÏ¸é µÈ´Ù.


¡¤TAKE RISK, DON¡¯T FAIL(Keynote) / Brian Muirhead

¡¤A PRACTICAL ATTACK AGAINST MDM SOLUTIONS / Daniel Brodie, Michael Shaulov

¡¤A TALE OF ONE SOFTWARE BYPASS OF WINDOWS 8 SECURE BOOT / Yuriy Bulygin, Andrew Furtak, Oleksandr Bazhaniuk

¡¤ABOVE MY PAY GRADE: CYBER RESPONSE AT THE NATIONAL LEVEL / Jason Healey

¡¤ANDROID: ONE ROOT TO OWN THEM ALL / Jeff Forristal

¡¤BINARYPIG - SCALABLE MALWARE ANALYTICS IN HADOOP / Zachary Hanif, Telvis Calhoun, Jason Trost

¡¤BIOS SECURITY / John Butterworth, Corey Kallenberg, Xeno Kovah

¡¤BLACK-BOX ASSESSMENT OF PSEUDORANDOM ALGORITHMS / Derek Soeder, Christopher Abad, Gabriel Acevedo

¡¤BLACKBERRYOS 10 FROM A SECURITY PERSPECTIVE / Ralf-Philipp Weinmann

¡¤BLUETOOTH SMART: THE GOOD, THE BAD, THE UGLY, AND THE FIX! / Mike Ryan

¡¤BOCHSPWN: IDENTIFYING 0-DAYS VIA SYSTEM-WIDE MEMORY ACCESS PATTERN ANALYSIS / Mateusz Jurczyk, Gynvael Coldwind

¡¤BUGALYZE.COM - DETECTING BUGS USING DECOMPILATION AND DATA FLOW ANALYSIS / Silvio Cesare

¡¤BUYING INTO THE BIAS: WHY VULNERABILITY STATISTICS SUCK / Brian Martin, Steve Christey

¡¤COMBATING THE INSIDER THREAT AT THE FBI: REAL WORLD LESSONS LEARNED / Patrick Reidy

¡¤COMPROMISING INDUSTRIAL FACILITIES FROM 40 MILES AWAY / Lucas Apa, Carlos Mario Penagos

¡¤CREEPYDOL: CHEAP, DISTRIBUTED STALKING / Brendan O'Connor

¡¤DEFENDING NETWORKS WITH INCOMPLETE INFORMATION: A MACHINE LEARNING APPROACH / Alexandre Pinto

¡¤DISSECTING CSRF ATTACKS & COUNTERMEASURES / Mike Shema, Sergey Shekyan, Vaagn Toukharian

¡¤END-TO-END ANALYSIS OF A DOMAIN GENERATING ALGORITHM MALWARE FAMILY / Jason Geffner

¡¤ENERGY FRAUD AND ORCHESTRATED BLACKOUTS: ISSUES WITH WIRELESS METERING PROTOCOLS (WM-BUS) / Cyrill Brunschwiler

¡¤EXPLOITING NETWORK SURVEILLANCE CAMERAS LIKE A HOLLYWOOD HACKER / Craig Heffner

¡¤EVADING DEEP INSPECTION FOR FUN AND SHELL / Olli-Pekka Niemi, Antti Levomaki

¡¤THE FACTORING DEAD: PREPARING FOR THE CRYPTOPOCALYPSE / Alex Stamos, Tom Ritter, Thomas Ptacek, Javed Samuel

¡¤FULLY ARBITRARY 802.3 PACKET INJECTION: MAXIMIZING THE ETHERNET ATTACK SURFACE / Andrea Barisani, Daniele Bianco

¡¤FUNDERBOLT: ADVENTURES IN THUNDERBOLT DMA ATTACKS / Russ Sevinsky

¡¤HACKING LIKE IN THE objectS: VISUALIZING PAGE TABLES FOR LOCAL EXPLOITATION / Georg Wicherski, Alexandru Radocea

¡¤HACKING, SURVEILLING, AND DECEIVING VICTIMS ON SMART TV / SeungJin 'Biest' Lee(À̽ÂÁø)

¡¤HIDING @ DEPTH - EXPLORING, SUBVERTING AND BREAKING NAND FLASH MEMORY / Josh 'm0nk' Thomas

¡¤HOME INVASION V2.0 - ATTACKING NETWORK-CONTROLLED HARDWARE / Daniel Crowley, David Bryan, Jennifer Savage

¡¤HONEY, I¡¯M HOME!! - HACKING Z-WAVE HOME AUTOMATION SYSTEMS / Behrang Fouladi, Sahand Ghanoun

¡¤HOT KNIVES THROUGH BUTTER: BYPASSING AUTOMATED ANALYSIS SYSTEMS / Abhishek Singh, Zheng Bu

¡¤HOW CVSS IS DOSSING YOUR PATCHING POLICY(AND WASTING YOUR MONEY) / Luca Allodi, Fabio Massacci

¡¤HOW TO BUILD A SPYPHONE / Kevin McNamee

¡¤HOW TO GROW A TREE(TAINT-ENABLED REVERSE ENGINEERING ENVIRONMENT) FROM CBASS(CROSS-PLATFORM BINARY AUTOMATED SYMBOLIC-EXECUTION SYSTEM) / Nathan Li, Loc Nguyen, Xing Li, James Just

¡¤HUNTING THE SHADOWS: IN DEPTH ANALYSIS OF ESCALATED APT ATTACKS / Fyodor Yarochkin, Tsung Pei Kan, Ming-Chang Chiu, Ming-Wei Benson Wu

¡¤I CAN HEAR YOU NOW: TRAFFIC INTERCEPTION AND REMOTE MOBILE PHONE CLONING WITH A COMPROMISED CDMA FEMTOCELL / Tom Ritter, Doug DePerry, Andrew Rahimi

¡¤IMPLANTABLE MEDICAL DEVICES: HACKING HUMANS / Barnaby Jack

¡¤IS THAT A GOVERNMENT IN YOUR NETWORK OR ARE YOU JUST HAPPY TO SEE ME? / Eric Fiterman

¡¤JAVA EVERY-DAYS: EXPLOITING SOFTWARE RUNNING ON 3 BILLION DEVICES/ Brian Gorenc, Jasiel Spelman

¡¤JAVASCRIPT STATIC SECURITY ANALYSIS MADE EASY WITH JSPRIME / Nishant Das Patnaik, Sarathi Sabyasachi Sahoo

¡¤JUST-IN-TIME CODE REUSE: THE MORE THINGS CHANGE, THE MORE THEY STAY THE SAME / Kevin Snow, Lucas Davi

¡¤LEGAL ASPECTS OF FULL SPECTRUM COMPUTER NETWORK (ACTIVE) DEFENSE / Robert Clark

¡¤LEGAL CONSIDERATIONS FOR CELLULAR RESEARCH / Marcia Hofmann, Kurt Opsahl

¡¤LESSONS FROM SURVIVING A 300GBPS DENIAL OF SERVICE ATTACK / Matthew Prince

¡¤LET'S GET PHYSICAL: BREAKING HOME SECURITY SYSTEMS AND BYPASSING BUILDINGS CONTROLS / Drew Porter, Stephen Smith

¡¤MACTANS: INJECTING MALWARE INTO IOS DEVICES VIA MALICIOUS CHARGERS / Billy Lau, Yeongjin Jang(À念Áø), Chengyu Song

¡¤MAINFRAMES: THE PAST WILL COME BACK TO HAUNT YOU /  Philip Young

¡¤MALTEGO TUNGSTEN AS A COLLABORATIVE ATTACK PLATFORM / Roelof Temmingh, Andrew MacPherson

¡¤MILLION BROWSER BOTNET / Jeremiah Grossman, Matt Johansen

¡¤MOBILE ROOTKITS: EXPLOITING AND ROOTKITTING ARM TRUSTZONE / Thomas Roth

¡¤MULTIPLEXED WIRED ATTACK SURFACES / Michael Ossmann, Kyle Osborn

¡¤OPTIROP: HUNTING FOR ROP GADGETS IN STYLE / Nguyen Anh Quynh

¡¤OUT OF CONTROL: DEMONSTRATING SCADA DEVICE EXPLOITATION / Eric Forner, Brian Meixell

¡¤THE OUTER LIMITS: HACKING THE SAMSUNG SMART TV / Aaron Grattafiori, Josh Yavor

¡¤OWNING THE ROUTING TABLE - PART II / Gabi Nakibly

PASS THE HASH AND OTHER CREDENTIAL THEFT AND REUSE: MITIGATING ¡¤THE RISK OF LATERAL MOVEMENT AND PRIVILEGE ESCALATION / Mark Simos, Patrick Jungles

¡¤PASS-THE-HASH 2: THE ADMIN'S REVENGE / Alva Duckwall, Chris Campbell

¡¤PIXEL PERFECT TIMING ATTACKS WITH HTML5 / Paul Stone

¡¤POST EXPLOITATION OPERATIONS WITH CLOUD SYNCHRONIZATION SERVICES / Jacob Williams

¡¤POWER ANALYSIS ATTACKS FOR CHEAPSKATES / Colin O'Flynn

¡¤PREDICTING SUSCEPTIBILITY TO SOCIAL BOTS ON TWITTER / Chris Sumner, Randall Wald

¡¤PRESS ROOT TO CONTINUE: DETECTING OSX AND WINDOWS BOOTKITS WITH RDFU / Mario Vuksan, Tomislav Pericin

¡¤REVEALING EMBEDDED FINGERPRINTS: DERIVING INTELLIGENCE FROM USB STACK INTERACTIONS / Andy Davis

¡¤RFID HACKING: LIVE FREE OR RFID HARD / Fran Brown

¡¤ROOTING SIM CARDS / Karsten Nohl

¡¤THE SCADA THAT DIDN'T CRY WOLF- WHO'S REALLY ATTACKING YOUR ICS DEVICES- PART DEUX! / Kyle Wilhoit

¡¤SMASHING THE FONT SCALER ENGINE IN WINDOWS KERNEL / Ling Chuan Lee, Chan Lee Yee

¡¤SPY-JACKING THE BOOTERS / Brian Krebs, Lance James

¡¤SSL, GONE IN 30 SECONDS - A BREACH BEYOND CRIME / Angelo Prado, Neal Harris, Yoel Gluck

¡¤STEPPING P3WNS: ADVENTURES IN FULL-SPECTRUM EMBEDDED EXPLOITATION(AND DEFENSE!) / Ang Cui, Michael Costello, Salvatore Stolfo

¡¤TERIDIAN SOC EXPLOITATION: EXPLORATION OF HARVARD ARCHITECTURE SMART GRID SYSTEMS / Josh 'm0nk' Thomas, Nathan Keltner

¡¤TLS 'SECRETS' / NextGen$

¡¤TOWN HALL MEETING: CFAA REFORM STRATEGY / Kurt Opsahl

[±Ç ÁØ ±âÀÚ(editor@boannews.com)]

  •  
  • 1
  • ÆäÀ̽ººÏ º¸³»±â Æ®À§ÅÍ º¸³»±â ³×À̹ö ¹êµå º¸³»±â Ä«Ä«¿À ½ºÅ丮 º¸³»±â ³×À̹ö ºí·Î±× º¸³»±â

  • ¡°
  •  SNS¿¡¼­µµ º¸¾È´º½º¸¦ ¹Þ¾Æº¸¼¼¿ä!! 
  • ¡±
 ÇÏÀÌÁ¨ ÆÄ¿öºñÁî 23³â 11¿ù 16ÀÏ~2024³â 11¿ù 15ÀϱîÁö ¾Æ½ºÆ®·Ð½ÃÅ¥¸®Æ¼ ÆÄ¿öºñÁî 2023³â2¿ù23ÀÏ ½ÃÀÛ À§Áîµð¿£¿¡½º 2018 ³Ý¾Øµå ÆÄ¿öºñÁî ÁøÇà 2020³â1¿ù8ÀÏ ½ÃÀÛ~2021³â 1¿ù8ÀϱîÁö
¼³¹®Á¶»ç
3¿ù 15ÀϺÎÅÍ ½ÃÇàµÇ°í ÀÖ´Â °³Á¤ °³ÀÎÁ¤º¸º¸È£¹ý°ú °ü·ÃÇØ °¡Àå ±î´Ù·Ó°í ÀÌÇàÇϱ⠾î·Á¿î Á¶Ç×Àº ¹«¾ùÀΰ¡¿ä?
ÀΰøÁö´É(AI) µî ÀÚµ¿È­µÈ °áÁ¤¿¡ ´ëÇÑ Á¤º¸ÁÖü ±Ç¸® ±¸Ã¼È­
Á¢±Ù±ÇÇÑ °ü¸® µî °³ÀÎÁ¤º¸ ¾ÈÀü¼º È®º¸Á¶Ä¡ °­È­ ¹× °íÀ¯½Äº°Á¤º¸ °ü¸®½ÇÅ Á¤±âÁ¶»ç
¿µÇâÆò°¡ ¿ä¾àº» °ø°³Á¦µµ µµÀÔ µî °³ÀÎÁ¤º¸ ¿µÇâÆò°¡Á¦µµ
¿µ»óÁ¤º¸Ã³¸®±â±â ¹× ¾ÈÀüÁ¶Ä¡ ±âÁØ
°³ÀÎÁ¤º¸ º¸È£Ã¥ÀÓÀÚÀÇ Àü¹®¼º °­È­ À§ÇÑ Àü¹®CPO ÁöÁ¤
±¹¿Ü ¼öÁý¡¤ÀÌÀü °³ÀÎÁ¤º¸ 󸮹æħ °ø°³ µî °³ÀÎÁ¤º¸ 󸮹æħ Æò°¡Á¦µµ
¼ÕÇعè»óÃ¥ÀÓ Àǹ«´ë»óÀÚ º¯°æ ¹× È®´ë
°ø°ø±â°ü °³ÀÎÁ¤º¸ º¸È£¼öÁØ Æò°¡ È®´ë
±âŸ(´ñ±Û·Î)