{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T21:54:33Z","timestamp":1775253273368,"version":"3.50.1"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030026127","type":"print"},{"value":"9783030026134","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,10,19]],"date-time":"2018-10-19T00:00:00Z","timestamp":1539907200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-02613-4_44","type":"book-chapter","created":{"date-parts":[[2018,10,18]],"date-time":"2018-10-18T14:22:39Z","timestamp":1539872559000},"page":"498-502","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Vulnerability Analysis on a Secure USB: Based on a Commercial Product A"],"prefix":"10.1007","author":[{"given":"Kyungroul","family":"Lee","sequence":"first","affiliation":[]},{"given":"Insu","family":"Oh","sequence":"additional","affiliation":[]},{"given":"Wonyoung","family":"Jang","sequence":"additional","affiliation":[]},{"given":"Chang","family":"Choi","sequence":"additional","affiliation":[]},{"given":"Kangbin","family":"Yim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,19]]},"reference":[{"key":"44_CR1","doi-asserted-by":"publisher","first-page":"834","DOI":"10.1002\/sec.580","volume":"5","author":"L Kyungroul","year":"2012","unstructured":"Kyungroul, L., Kangbin, Y., Eugine, H.S.: Reverse-safe authentication protocol for secure USB memories. J. Secur. Commun. Netw. 5, 834\u2013845 (2012)","journal-title":"J. Secur. Commun. Netw."},{"key":"44_CR2","first-page":"136","volume":"3","author":"K Jaein","year":"2013","unstructured":"Jaein, K., Youngjun, L., Kyungroul, L., Taeyoung, J., Dmitry, V., Kangbin, Y.: Vulnerability to flash controller for secure USB drives. J. Internet Serv. Inf. Secur. 3, 136\u2013145 (2013)","journal-title":"J. Internet Serv. Inf. Secur."},{"key":"44_CR3","first-page":"46","volume":"1","author":"L Kyungroul","year":"2010","unstructured":"Kyungroul, L., Hyeungjun, Y., Youngtae, C., Sitha, P., Ilsun, Y., Kangbin, Y.: Safe authentication protocol for secure USB memories. J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. 1, 46\u201355 (2010)","journal-title":"J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl."},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"MyoungSu, K., Kyungroul, L., Kangbin, Y.: Vulnerability analysis of secure disk: based on backup feature of product A. In: International Conference on Broadband and Wireless Computing, Communication and Applications, Barcelona, pp. 386\u2013391 (2017)","DOI":"10.1007\/978-3-319-69811-3_35"},{"key":"44_CR5","doi-asserted-by":"publisher","first-page":"S114","DOI":"10.1016\/j.diin.2010.05.014","volume":"7","author":"B Jewan","year":"2010","unstructured":"Jewan, B., Byeongyeong, Y., Sangjin, L.: Secure USB bypassing tool. J. Digit. Invest. 7, S114\u2013S120 (2010)","journal-title":"J. Digit. Invest."},{"key":"44_CR6","unstructured":"Joe, G.: Attacks on and countermeasures for USB hardware token devices. In: Proceedings of the 5th Nordic Workshop on Secure IT Systems, Reykjavik, pp. 35\u201357 (2000)"},{"key":"44_CR7","doi-asserted-by":"crossref","unstructured":"Hanjae, J., Younsung, C., Woongryel, J., Fei, Y., Yunho, L., Seungjoo, K., and Dongho, W.: Vulnerability analysis of secure USB flash drives. In: Proceedings of the 2007 IEEE International Workshop on Memory Technology, Design and Testing, Taipei, pp. 61\u201364 (2007)","DOI":"10.1109\/MTDT.2007.4547620"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Keun-Gi, L., Hye-Won, L., Chang-Wook, P., Je-Wan, B., Kwon-youp, K., Sangjin, L.: USB PassOn: secure USB thumb drive forensic toolkit. In: Proceedings of the 2nd International Conference on Future Generation Communication and Networking, Hainan Island, pp. 279\u2013282 (2008)","DOI":"10.1109\/FGCN.2008.214"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on Broadband and Wireless Computing, Communication and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02613-4_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T20:40:04Z","timestamp":1775248804000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-02613-4_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,19]]},"ISBN":["9783030026127","9783030026134"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02613-4_44","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,19]]},"assertion":[{"value":"BWCCA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Broadband and Wireless Computing, Communication and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taichung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"bwcca2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}