{"id":1544,"date":"2018-09-17T19:53:14","date_gmt":"2018-09-17T10:53:14","guid":{"rendered":"http:\/\/pel.sejong.ac.kr\/wordpress\/?p=1544"},"modified":"2018-09-18T00:20:36","modified_gmt":"2018-09-17T15:20:36","slug":"samsung-security-tech-forum2","status":"publish","type":"post","link":"https:\/\/pel.sejong.ac.kr\/wordpress\/?p=1544","title":{"rendered":"SAMSUNG SECURITY TECH FORUM2"},"content":{"rendered":"<p>2018\ub144 8\uc6d4 27\uc77c, \ud558\uacc4 \ubc29\ud559\uc774 \ub05d\ub098\uac08 \ubb34\ub835 \uc5f0\uad6c\uc2e4 \uc778\uc6d0 \ubaa8\ub450 \uc81c 2\ud68c Samsung Security Tech Forum\uc5d0 \ucc38\uac00\ud558\uc600\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\ud0a4\ub178\ud2b8\uc5d0\uc11c\ub294 Ahmad-Reza Sadeghi \uad50\uc218\uc758 &#8220;Things, Threats, Trust: Tracking Security &amp; Privacy Challenges in the Brave New IoT World&#8221; \ub77c\ub294 \uc81c\ubaa9\uc758 \ubc1c\ud45c\uc640 Adam Doup<span style=\"color: #000000;\"><a style=\"color: #000000;\" href=\"https:\/\/adamdoupe.com\/\">\u00e9<\/a><\/span> \uad50\uc218\uc758 &#8220;History and Future of Automated Vulnerability Analysis&#8221;\ub77c\ub294 \uc81c\ubaa9\uc758 \ubc1c\ud45c\uac00 \uc788\uc5c8\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\uc774\ud6c4 \ubcf8 \uc138\uc158\uc5d0\uc11c\ub294 2\uc2dc\uac04 \ubc18\uc5d0 \uac78\uccd0 Security \ud2b8\ub799\uacfc Hacking \ud2b8\ub799\uc73c\ub85c \ub098\ub258\uc5b4 \ub9e4\uc6b0 \uc720\uc775\ud558\uace0 \ud765\ubbf8\ub85c\uc6b4 \uac15\uc5f0\ub4e4\uc774 \uc9c4\ud589\ub418\uc5c8\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\ube44\uac00 \uc624\ub294 \uad82\uc740 \ub0a0\uc528\uc784\uc5d0\ub3c4 \ub9ce\uc740 \ud559\uc0dd\ub4e4\uacfc \uad00\ub828 \uc5c5\uc885 \uc885\uc0ac\uc790 \ubd84\ub4e4\uc774 \ubc29\ubb38\ud558\uc600\uc73c\uba70 \uc5f4\ub764 \uac15\uc5f0\uacfc \uccad\uac15\uc774 \uc774\ub8e8\uc5b4\uc84c\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\ubcf4\uc548\uc744 \uacf5\ubd80\ud558\uace0\uc790 \ubaa8\uc778\u00a0 \ub2e4\uc591\ud55c \uc0ac\ub78c\ub4e4\uc758 \uc5f4\uc815 \uc18d\uc5d0\uc11c \ub3c5\ub824 \ubc1b\uc744 \uc218 \uc788\ub294 \uc88b\uc740 \uae30\ud68c\uc600\uc2b5\ub2c8\ub2e4.<\/p>\n<p><a href=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2018\/09\/sstp\ub2e8\uccb4\uc0ac\uc9c4.jpg\"><img loading=\"lazy\" class=\"size-medium wp-image-1547 aligncenter\" src=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2018\/09\/sstp\ub2e8\uccb4\uc0ac\uc9c4-595x446.jpg\" alt=\"\" width=\"595\" height=\"446\" srcset=\"https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2018\/09\/sstp\ub2e8\uccb4\uc0ac\uc9c4-595x446.jpg 595w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2018\/09\/sstp\ub2e8\uccb4\uc0ac\uc9c4.jpg 960w, https:\/\/pel.sejong.ac.kr\/wordpress\/wp-content\/uploads\/2018\/09\/sstp\ub2e8\uccb4\uc0ac\uc9c4-300x225.jpg 300w\" sizes=\"(max-width: 595px) 100vw, 595px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2018\ub144 8\uc6d4 27\uc77c, \ud558\uacc4 \ubc29\ud559\uc774 \ub05d\ub098\uac08 \ubb34\ub835 \uc5f0\uad6c\uc2e4 \uc778\uc6d0 \ubaa8\ub450 \uc81c 2\ud68c Samsung Security Tech Forum\uc5d0 \ucc38\uac00\ud558\uc600\uc2b5\ub2c8\ub2e4. \ud0a4\ub178\ud2b8\uc5d0\uc11c\ub294 Ahmad-Reza Sadeghi \uad50\uc218\uc758 &#8220;Things, Threats, Trust: Tracking Security &amp; Privacy Challenges in the Brave New IoT World&#8221; \ub77c\ub294 \uc81c\ubaa9\uc758 \ubc1c\ud45c\uc640 Adam Doup\u00e9 \uad50\uc218\uc758 &#8220;History and Future of Automated Vulnerability Analysis&#8221;\ub77c\ub294 \uc81c\ubaa9\uc758 \ubc1c\ud45c\uac00 \uc788\uc5c8\uc2b5\ub2c8\ub2e4. \uc774\ud6c4 \ubcf8 \uc138\uc158\uc5d0\uc11c\ub294 2\uc2dc\uac04 [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[],"_links":{"self":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/1544"}],"collection":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1544"}],"version-history":[{"count":5,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/1544\/revisions"}],"predecessor-version":[{"id":1555,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/1544\/revisions\/1555"}],"wp:attachment":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}