SlideShare a Scribd company logo
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
1
Blockchain Overview &
Introduction
- Technical Concepts of Blockchain Systems -
๋ณด์•ˆ๊ณตํ•™์—ฐ๊ตฌ์‹ค
๊น€์Šน์ฃผ ๊ต์ˆ˜ (skim71@korea.ac.kr)
๋ฏธ๋ž˜์œตํ•ฉ๊ธฐ์ˆ ๊ด€ 610ํ˜ธ
์ € ์„œ
Security Assessment aNd Engineering Lab
www.KimLab.net / www.HackProof.systems
์ฃผ์š” ๊ฒฝ๋ ฅ :
1990.3~1999.2) ์„ฑ๊ท ๊ด€๋Œ€ํ•™๊ต ๊ณตํ•™ ํ•™์‚ฌยท์„์‚ฌยท๋ฐ•์‚ฌ
1998.12~2004.2) KISA ์•”ํ˜ธ๊ธฐ์ˆ ํŒ€์žฅ ๋ฐ CCํ‰๊ฐ€1ํŒ€์žฅ
2004.3~2011.2) ์„ฑ๊ท ๊ด€๋Œ€ํ•™๊ต ์ •๋ณดํ†ต์‹ ๊ณตํ•™๋ถ€ ๋ถ€๊ต์ˆ˜
2011.3~ํ˜„์žฌ) ๊ณ ๋ ค๋Œ€ํ•™๊ต ์‚ฌ์ด๋ฒ„๊ตญ๋ฐฉํ•™๊ณผโˆ™์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์› ์ •๊ต์ˆ˜
(์‚ฌ)HARU & SECUINSIDE ์„ค๋ฆฝ์ž ๋ฐ ์ด์‚ฌ
2017.4~ํ˜„์žฌ) ๊ตญ๋ฐฉRMF์—ฐ๊ตฌ์„ผํ„ฐ(AR2C) ์„ผํ„ฐ์žฅ
2018.5~ํ˜„์žฌ) ๊ณ ์‹ ๋ขฐ๋ณด์•ˆ์šด์˜์ฒด์ œ์—ฐ๊ตฌ์„ผํ„ฐ(CHAOS) ์„ผํ„ฐ์žฅ
ๅ‰) ์œก๊ตฐ์‚ฌ๊ด€ํ•™๊ต ์ดˆ๋น™๊ต์ˆ˜
ๅ‰) ๊ฐœ์ธ์ •๋ณด๋ถ„์Ÿ์กฐ์ •์œ„์›ํšŒ ์œ„์›
ๅ‰) ๋Œ€ํ†ต๋ น์ง์† 4์ฐจ์‚ฐ์—…ํ˜๋ช…์œ„์›ํšŒ ์œ„์›
็พ) ํ•ฉ๋™์ฐธ๋ชจ๋ณธ๋ถ€ ์ •์ฑ…์ž๋ฌธ์œ„์›
็พ) ๊ตญ๋ฐฉ๋ถ€ CIO ์ž๋ฌธ์œ„์›
็พ) Black Hat Asia Review Board
- SCI(E) ๋…ผ๋ฌธ: 76ํŽธ, ์ธ์šฉํšŸ์ˆ˜: 4800+ (๊ตฌ๊ธ€ ๊ธฐ์ค€)
- '07, '18: ๊ตญ๊ฐ€์ •๋ณด์›์žฅ ๋ฐ ํ–‰์ •์•ˆ์ „๋ถ€ ์žฅ๊ด€ ํ‘œ์ฐฝ
- '12, '16: ๊ณ ๋ ค๋Œ€ํ•™๊ต ์„ํƒ‘๊ฐ•์˜์ƒ (์ƒ์œ„ 5%)
- '19: ๊ตญ๊ฐ€๊ณต๋ฌด์›์ธ์žฌ๊ฐœ๋ฐœ์› ๋ฒ ์ŠคํŠธ๊ฐ•์‚ฌ ๋ช…์—์˜์ „๋‹น ํ—Œ์ • (์ƒ์œ„ 0.3% = 3๋ช…/800์—ฌ๋ช…)
- ACSAC (1ํŽธ), AsiaCrypt (1ํŽธ), BlackHat (6ํŽธ), CT-RSA (3ํŽธ), DEFCON (4ํŽธ), ICCC (8ํŽธ), Virus Bulletin (2ํŽธ)
- KBS '๋ช…๊ฒฌ๋งŒ๋ฆฌ', '์žฅ์˜์‹ค์‡ผ', '์Œค๊ณผ ํ•จ๊ป˜', EBS '๊ณผํ•™๋‹คํ ๋น„์š˜๋“œ', JTBC '์ฐจ์ด๋‚˜๋Š” ํด๋ผ์Šค' ๋ฐ tvN '๋ฏธ๋ž˜์ˆ˜์—…' ๋“ฑ ๋‹ค์ˆ˜ ์ถœ์—ฐ
์ฃผ์š” R&D ์„ฑ๊ณผ
2
Google์— DRM ํŠนํ—ˆ ๋งค๊ฐ (2020๋…„)
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
๋น„ํŠธ์ฝ”์ธ๊ณผ ๋ธ”๋ก์ฒด์ธ์˜ ํƒ„์ƒ
3
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
๋น„ํŠธ์ฝ”์ธ (2008)
(In October 2008, posted to the Cypherpunks mailing list)
4
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
5
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
๋น„ํŠธ์ฝ”์ธ์€ ์ตœ์ดˆ์˜ ์•”ํ˜ธํ™”ํ์ธ๊ฐ€?
(Crypto 1982)
6
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
7
(Bas Wisselink, โ€œHistory of Bitcoin Where Do We Come From?โ€, February 15, 2018)
๋น„ํŠธ์ฝ”์ธ์€ ์ตœ์ดˆ์˜ ์•”ํ˜ธํ™”ํ์ธ๊ฐ€?
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
๋น„ํŠธ์ฝ”์ธ์€ ์˜จ์ „ํžˆ ๋…์ฐฝ์ ์ธ๊ฐ€?
8
Smart
Contract
PoW
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
์™œ ์•”ํ˜ธํ™”ํ๋Š” ๋งŒ๋“ค๊ธฐ ์–ด๋ ค์šด๊ฐ€?
9
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
eCash (1982)
(David Chaum, "Blind Signatures for Untraceable Payments", Crypto 1982)
10
์•”ํ˜ธํ™”ํ ์ด์šฉ์ž A
์ƒ์  X
1. ์•”ํ˜ธํ™”ํ ๋ฐœํ–‰
4. ์žฅ๋ถ€์— ํ•ด๋‹น ์•”ํ˜ธํ™”ํ๊ฐ€ ์‚ฌ์šฉ๋œ
๊ธฐ๋ก์ด ์žˆ๋Š”์ง€ ์—ฌ๋ถ€๋ฅผ ํ™•์ธ
2. ์ง€๋ถˆ
1477
1477
3. ์•”ํ˜ธํ™”ํ
๊ฒ€์ฆ์š”๊ตฌ
6. ์ƒํ’ˆ/์„œ๋น„์Šค
5. ์œ ํšจ์„ฑ (์‹ ๊ทœ์‚ฌ์šฉ
or ์ค‘๋ณต์‚ฌ์šฉ) ํ†ต๋ณด
1477
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘ (2008)
11
โ€œ์ค‘์•™์€ํ–‰์€ ๋ฒ•์ •ํ†ตํ™” ๊ฐ€์น˜์— ๋…ผ์Ÿ์˜ ์—ฌ์ง€๊ฐ€ ์—†๋„๋ก ์‹ ๋ขฐ๋ฅผ
๋ฐ›์•„์•ผ ํ•˜์ง€๋งŒ, ํ™”ํ์˜ ์—ญ์‚ฌ๋Š” ๊ทธ๋Ÿฐ ์‹ ๋ขฐ๋ฅผ ์™„์ „ํžˆ ์ €๋ฒ„๋ฆฐ ์‚ฌ
๋ก€๋กœ ๊ฐ€๋“ํ•˜๋‹ค. ์€ํ–‰์€ ์šฐ๋ฆฌ์˜ ๋ˆ์„ ์•ˆ์ „ํ•˜๊ฒŒ ๋ณด๊ด€ํ•ด์•ผ ํ•˜์ง€
๋งŒ, ๊ทธ๋“ค์€ ๋ฌด๋ถ„๋ณ„ํ•œ ๋Œ€์ถœ๋กœ ์‹ ์šฉ๋ฒ„๋ธ”์„ ์œ ๋ฐœํ–ˆ๋‹ค.โ€
โ€“ Satoshi Nakamoto โ€“
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
(David Chaum, "Blind Signatures for Untraceable Payments", Crypto 1982)
12
์•”ํ˜ธํ™”ํ ์ด์šฉ์ž A
์ƒ์  X
1. ์•”ํ˜ธํ™”ํ ๋ฐœํ–‰
4. ์žฅ๋ถ€์— ํ•ด๋‹น ์•”ํ˜ธํ™”ํ๊ฐ€ ์‚ฌ์šฉ๋œ
๊ธฐ๋ก์ด ์žˆ๋Š”์ง€ ์—ฌ๋ถ€๋ฅผ ํ™•์ธ
2. ์ง€๋ถˆ
1477
3. ์•”ํ˜ธํ™”ํ
๊ฒ€์ฆ์š”๊ตฌ
6. ์ƒํ’ˆ/์„œ๋น„์Šค
5. ์œ ํšจ์„ฑ (์‹ ๊ทœ์‚ฌ์šฉ
or ์ค‘๋ณต์‚ฌ์šฉ) ํ†ต๋ณด
1477
Bitcoin (2008)
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
1477
(David Chaum, "Blind Signatures for Untraceable Payments", Crypto 1982)
13
์•”ํ˜ธํ™”ํ ์ด์šฉ์ž A
์ƒ์  X
1. ์•”ํ˜ธํ™”ํ ๋ฐœํ–‰
2. ์ง€๋ถˆ
1477
3. ์•”ํ˜ธํ™”ํ
๊ฒ€์ฆ์š”๊ตฌ
6. ์ƒํ’ˆ/์„œ๋น„์Šค
5. ์œ ํšจ์„ฑ (์‹ ๊ทœ์‚ฌ์šฉ
or ์ค‘๋ณต์‚ฌ์šฉ) ํ†ต๋ณด
1477
4. ๋ธ”๋ก์ฒด์ธ์— ํ•ด๋‹น ๋น„ํŠธ์ฝ”์ธ์ด
์‚ฌ์šฉ๋œ ๊ธฐ๋ก์ด ์žˆ๋Š”์ง€ ์—ฌ๋ถ€๋ฅผ ํ™•์ธ
Bitcoin (2008)
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘ (2008)
14
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
15
์ƒ์  X
Aโ†’Y:1477
Bโ†’Z:1423
โ€˜์ค‘๋ณต ์‚ฌ์šฉโ€™
โ€˜์ค‘๋ณต์‚ฌ์šฉโ€™
โ€˜์ค‘๋ณต์‚ฌ์šฉโ€™
1477
(Satoshi Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System" 2008)
Aโ†’Y:1477
Bโ†’Z:1423
Aโ†’Y:1477
Bโ†’Z:1423
ID: 1477
A
Seller X
Seller Y
๋น„ํŠธ์ฝ”์ธ ์ด์šฉ์ž A
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
16
์ƒ์  X
Aโ†’Y:1477
Bโ†’Z:1423
โ€˜์‹ ๊ทœ ์‚ฌ์šฉโ€™
โ€˜์ค‘๋ณต์‚ฌ์šฉโ€™
โ€˜์ค‘๋ณต์‚ฌ์šฉโ€™
1477
(Satoshi Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System" 2008)
Aโ†’Y:1477
Bโ†’Z:1423 Bโ†’Z:1423
๋น„ํŠธ์ฝ”์ธ ์ด์šฉ์ž A
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
[์ฐธ๊ณ ] ๋น„์ž”ํ‹ด ์˜ค๋ฅ˜ (Byzantine Faults)
(ACM Transactions on Programming Languages and Systems (TOPLAS), July 1982)
17
๏ƒผ Bugs (Perhaps on a single node)
๏ƒผ Intentional malice (Perhaps a single node)
๏ƒผ Conspiracies (Multiple bad nodes)
Byzantine Faults
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
18
(Satoshi Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System" 2008)
์ธํ„ฐ๋„ท ํˆฌํ‘œ๋ฅผ ํ†ตํ•œ ์žฅ๋ถ€์˜ ์ฃผ๊ธฐ์ (10๋ถ„) ๋™๊ธฐํ™”๊ฐ€ ํ•„์š”
๋น„์ž”ํ‹ด ์˜ค๋ฅ˜๋ฅผ ๋ง‰๋Š” ๋ฒ•, ๋ธ”๋ก์ฒด์ธ
1423
1477
1423
Aโ†’Y:1477
Bโ†’Z:1423
Aโ†’Y:1477
Bโ†’Z:1423 Bโ†’Z:1423
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
Blockchain is โ€ฆ
๋ถ„์‚ฐ๋œ ๊ณต๊ฐœ์žฅ๋ถ€ + โ€œ์ธํ„ฐ๋„ท ํˆฌํ‘œ (์ฃผ๊ธฐ์  ๋™๊ธฐํ™”)โ€
19
๋น„์ž”ํ‹ด ์˜ค๋ฅ˜๋ฅผ ๋ง‰๋Š” ๋ฒ•, ๋ธ”๋ก์ฒด์ธ
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
20
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
(Vitalik Buterin)
โ€œWhereas most technologies
tend to automate workers on
the periphery doing menial
tasks, blockchains automate
away the center. Instead of
putting the taxi driver out of a
job, blockchain puts Uber out of
a job and lets the taxi drivers
work with the customer directly.โ€
21
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
1. ๊ฐ์ž๊ฐ€ ๊ด€์ฐฐํ•œ 10๋ถ„๊ฐ„์˜ ๋ชจ๋“  ๊ฑฐ๋ž˜๋‚ด์—ญ์„
1MB ํŒŒ์ผ(์ผ๋ช…, block)์— ๊ธฐ๋ก
2. ํšŒ๋žŒ
3. ์„œ๋กœ ๋‹ค๋ฅธ ์žฅ๋ถ€๊ฐ€ ์กด์žฌํ•  ๊ฒฝ์šฐ ํˆฌํ‘œ
22
๋น„์ž”ํ‹ด ์˜ค๋ฅ˜๋ฅผ ๋ง‰๋Š” ๋ฒ•, ๋ธ”๋ก์ฒด์ธ
Aโ†’Y:1477
Bโ†’Z:1423
Aโ†’Y:1477
Bโ†’Z:1423 Bโ†’Z:1423
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
1. ๊ฐ์ž๊ฐ€ ๊ด€์ฐฐํ•œ 10๋ถ„๊ฐ„์˜ ๋ชจ๋“  ๊ฑฐ๋ž˜๋‚ด์—ญ์„
1MB ํŒŒ์ผ(์ผ๋ช…, block)์— ๊ธฐ๋ก
2. ํšŒ๋žŒ
3. ์„œ๋กœ ๋‹ค๋ฅธ ์žฅ๋ถ€๊ฐ€ ์กด์žฌํ•  ๊ฒฝ์šฐ ํˆฌํ‘œ
4. ์„ ์ถœ๋œ ์žฅ๋ถ€๋ฅผ ๋ณด๊ด€์ค‘์ด๋˜ ์ด์ „ ์žฅ๋ถ€
๋“ค์— ์—ฐ๊ฒฐํ•ด(์ผ๋ช…, chain) ๊ฐ์ž ๋ณด๊ด€
23
๋น„์ž”ํ‹ด ์˜ค๋ฅ˜๋ฅผ ๋ง‰๋Š” ๋ฒ•, ๋ธ”๋ก์ฒด์ธ
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
์ฑ„๊ตด(mining) : ๋น„ํŠธ์ฝ”์ธ์„ ์–ป๋Š” ๊ฐ€์žฅ ๊ธฐ๋ณธ์ ์ธ ๋ฐฉ๋ฒ•
24
๋ธ”๋ก์ฒด์ธ์—์„œ์˜ ์ฐธ์—ฌ์œ ๋„ ๋ฐฉ๋ฒ•, ์ฑ„๊ตด
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
A
D
B C
E
25
๋ธ”๋ก์ฒด์ธ์—์„œ์˜ ์ฐธ์—ฌ์œ ๋„ ๋ฐฉ๋ฒ•, ์ฑ„๊ตด
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
๏ฎ ์ธํ”Œ๋ ˆ์ด์…˜์„ ๋ฐฉ์ง€ํ•˜๊ธฐ ์œ„ํ•ด ์•ฝ 4๋…„๋งˆ๋‹ค
๋ณด์ƒ์„ ๋ฐ›๋Š” ๊ฐ€๊ฒฉ์ด ์ ˆ๋ฐ˜์œผ๋กœ ๋–จ์–ด์ง€๋„๋ก
์„ค๊ณ„๋จ.
๏ฎ ์ดˆ๊ธฐ ๋ณด์ƒ์•ก์€ 2009๋…„ 50 Bitcoin์ด์—ˆ๊ณ ,
2013๋…„์—๋Š” 25 Bitcoin, 2016๋…„์—๋Š” 12.5
Bitcoin์ด์—ˆ์œผ๋ฉฐ, ์ด๋Š” ๊ณ„์†ํ•ด์„œ ์ค„์–ด๋“ฌ.
๏ฎ ๋Š์ž„์—†์ด ๋ฐ˜์œผ๋กœ ์ค„์–ด๋“ค๋ฉด ์ตœ์ข…์—๋Š” ์•ฝ
2์ฒœ1๋ฐฑ๋งŒ ๊ฐœ์˜ Bitcoin๋งŒ ์กด์žฌํ•˜๊ฒŒ ๋จ.
๏ฎ 2140๋…„ 5์›”7์ผ๊ฒฝ ๋ชจ๋“  Bitcoin์ด ์ƒ์„ฑ๋ 
๊ฒƒ์œผ๋กœ ์˜ˆ์ธก๋จ.
๏ฎ Block rewards โ†’ Transaction fees
(* But, in ACM CCS 2016, Miles Carlsten et al. showed that the stability of bitcoin is
NOT guaranteed as mining rewards decline.) 26
๋ธ”๋ก์ฒด์ธ์—์„œ์˜ ์ฐธ์—ฌ์œ ๋„ ๋ฐฉ๋ฒ•, ์ฑ„๊ตด
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
(Source: http://www.bitcoinblockhalf.com)
27
๋ธ”๋ก์ฒด์ธ์—์„œ์˜ ์ฐธ์—ฌ์œ ๋„ ๋ฐฉ๋ฒ•, ์ฑ„๊ตด
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
Bitcoin Genesis Block
28
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
29
โ€œ์‚ฌํ† ์‹œ ๋‚˜์นด๋ชจํ† ๋Š” ์ •๋ถ€์˜ ํ•„์š”์— ๋”ฐ๋ผ ๋ฐœํ–‰๋Ÿ‰ ์ฆ๊ฐ€๊ฐ€ ๊ฐ€๋Šฅํ•œ
ํ˜„์žฌ์˜ ํ™”ํ ์‹œ์Šคํ…œ์„ ๊ฐœํ˜ํ•˜๊ณ ์ž ๋น„ํŠธ์ฝ”์ธ์„ ๋ฐœํ‘œโ€
โ€ป ๊ฐœ๋ฐœ ๋™๊ธฐ๊ฐ€ ๋ช…์‹œ์ ์œผ๋กœ ์•Œ๋ ค์ง„ ๋ฐ”๋Š” ์—†์œผ๋‚˜, ๋น„ํŠธ์ฝ”์ธ ์ฒซ ๋ธ”๋ก ์—ฌ๋ฐฑ์— ์˜๊ตญ์˜ ๊ณต์ ์ž๊ธˆ
ํˆฌ์ž…์„ ํ†ตํ•œ ์€ํ–‰ ์žฌ์ • ์›์กฐ ๊ด€๋ จ ํƒ€์ž„์Šค ๊ธฐ์‚ฌ ๋‚ด์šฉ์ด ํฌํ•จ๋˜์–ด ์žˆ์–ด ์ด๋ฅผ ํ†ตํ•ด ์ถ”์ • ๋ฐ
ํšŒ์ž๋˜๋Š” ่ชช์ž„.
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
๋น„ํŠธ์ฝ”์ธ/๋ธ”๋ก์ฒด์ธ ๋„คํŠธ์›Œํฌ
(Source: Andreas M. Antonopoulos, "Mastering Bitcoin", O'REILLY)
30
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
31
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
32
๋‹ค์–‘ํ•œ Distributed Ledger Technology
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
33
๊ฐ€์ƒํ™”ํ(์ž์‚ฐ) vs. ์•”ํ˜ธํ™”ํ(์ž์‚ฐ)
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
๋ฐœํ–‰์ฃผ์ฒด
๊ตฌํ˜„๋ฐฉ์‹
์ •๋ถ€(์ค‘์•™์€ํ–‰) ๋ฏผ๊ฐ„๋‹จ์ฒด ๋˜๋Š” ๊ธฐ์—…
์ค‘์•™์ง‘์ค‘ํ˜•
CBDC (Central Bank
Digital Currency)
Virtual Currency
ํƒˆ์ค‘์•™ํ˜•
(Blockchain)
CBDC (Central Bank
Digital Currency)
Virtual Currency or
Cryptocurrency
โ€˜์ค‘์•™์€ํ–‰์ด ๋ฐœํ–‰ํ•˜๋Š” ๋””์ง€ํ„ธ ํ™”ํโ€™, CBDC๋Š” ๋ง ๊ทธ๋Œ€๋กœ ๋ฐœํ–‰
์ฃผ์ฒด๊ฐ€ ๋ฏผ๊ฐ„์ด ์•„๋‹Œ ์ •๋ถ€์ด๋ฉฐ, ๊ทธ๋ ‡๊ธฐ์— ๋ฒ•์  ํšจ๋ ฅ ๋˜ํ•œ
๊ฐ€์ง„๋‹ค๋Š” ์ ์—์„œ Bitcoin ๋“ฑ์˜ ์•”ํ˜ธํ™”ํ์™€ ์ฐจ๋ณ„ํ™” ๋จ.
34
eCash(1982)
Bitcoin(2008)
๊ฐ€์ƒํ™”ํ(์ž์‚ฐ) vs. ์•”ํ˜ธํ™”ํ(์ž์‚ฐ)
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
35
๊ฐ€์ƒํ™”ํ(์ž์‚ฐ) vs. ์•”ํ˜ธํ™”ํ(์ž์‚ฐ)
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
36
๊ฐ€์ƒํ™”ํ(์ž์‚ฐ) vs. ์•”ํ˜ธํ™”ํ(์ž์‚ฐ)
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
37
(March 25, 2021)
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
38
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
๏ƒผ โ€œInteroperability should be enabled between CBDC (central bank digital currency)
systems of different jurisdictions and exchange.โ€
๏ƒผ "We also propose a scalable and overseen foreign exchange platform supported
by DLT (distributed ledger technology like blockchain) or other technologies."
39
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
์•ŒํŠธ์ฝ”์ธ(Altcoin) (Source: https://coin360.io/, Note: As of 17:00 July 27, 2018)
40
์•”ํ˜ธํ™”ํ๋Š” 2018๋…„ 3์›”11์ผ ๊ธฐ์ค€ 1,523๊ฐœ๊ฐ€ ์œ ํ†ต๋˜๊ณ  ์žˆ
์œผ๋ฉฐ, 2013๋…„ 4์›”๋ถ€ํ„ฐ ์•ฝ 5๋…„ ๋™์•ˆ 2,544๊ฐœ๊ฐ€ ์‹ ๊ทœ ๋ฐœํ–‰
๋˜๊ณ  1,028๊ฐœ๊ฐ€ ํ‡ด์ถœ ๋จ. (๋ถ„์„๊ธฐ๊ฐ„ ์ค‘ ๋งค์ฃผ ํ‰๊ท ์ ์œผ๋กœ
17.1๊ฐœ๊ฐ€ ์‹ ๊ทœ๋ฐœํ–‰๋˜๊ณ  12.7๊ฐœ๊ฐ€ ํ‡ด์ถœ)
- ์˜ˆ๊ธˆ๋ณดํ—˜์—ฐ๊ตฌํฌ๋Ÿผ 2018 -
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
์•ŒํŠธ์ฝ”์ธ(Altcoin) (Source: https://coin360.io/, Note: As of 17:00 July 27, 2018)
2018๋…„ 3์›”11์ผ 1,523๊ฐœ โ†’ 2019๋…„ 8์›”21์ผ 2,457๊ฐœ โ†’
2021๋…„ 3์›”21์ผ 8,899๊ฐœ โ†’ 2021๋…„ 4์›”22์ผ 9,420๊ฐœ โ†’
2021๋…„ 5์›”23์ผ 0์‹œ30๋ถ„ 1๋งŒ3๊ฐœ
41
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
๋น„ํŠธ์ฝ”์ธ๊ณผ ๋ธ”๋ก์ฒด์ธ์ด
๋‹น๋ฉดํ•œ ๊ธฐ์ˆ ์  ๋ฌธ์ œ
42
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
43
๊ฐ€๊ฒฉ ๋ณ€๋™์„ฑ
๋น„ํŠธ์ฝ”์ธ ํ”ผ์ž๋ฐ์ด๋Š”
2010๋…„ 5์›” 22์ผ ๋ฏธ๊ตญ
์˜ ํ•œ ํ”„๋กœ๊ทธ๋ž˜๋จธ๊ฐ€ 1
๋งŒ ๊ฐœ์˜ ๋น„ํŠธ์ฝ”์ธ์œผ๋กœ
ํ”ผ์ž 2ํŒ์„ ๊ตฌ๋งคํ•œ ๋‚ 
์ž„. ๊ฐ€์ƒ์ž์‚ฐ์„ ํ™œ์šฉํ•œ
์ตœ์ดˆ์˜ ์‹ค๋ฌผ ๊ฑฐ๋ž˜๋ฅผ ๊ธฐ
๋…ํ•˜๊ธฐ ์œ„ํ•ด ๋งˆ๋ จ๋์Œ.
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
๏ฎ 2008๋…„์— ๋ถ๊ฒฝ ์˜ฌ๋ฆผํ”ฝ์ด ์—ด๋ฆฐ ์‚ฌ์‹ค์—์„œ๋„ ์•Œ ์ˆ˜
์žˆ๋“ฏ์ด 2008~2010๋…„ ์ดˆ๋ฐ˜, ์ค‘๊ตญ์— ์‹ ํฅ๋ถ€์ž๋“ค์ด
๋Œ€๊ฑฐ ์ƒ๊น€. (์ค‘๊ตญ ๊ฐœํ˜๊ฐœ๋ฐฉ 40๋…„)
๏ฎ ์‹ค์ œ๋กœ 2016๋…„ 2์›” ํ›„๋ฃฌ๊ธ€๋กœ๋ฒŒ๋ฆฌ์„œ์น˜๊ฐ€ ๋ฐœํ‘œํ•œ
โ€˜2016 ์„ธ๊ณ„ ๋ฐฑ๋งŒ์žฅ์ž ๋ฆฌ์ŠคํŠธโ€™์— ๋”ฐ๋ฅด๋ฉด, โ€œ์ค‘๊ตญ์˜ ๋ฐฑ
๋งŒ์žฅ์ž ์ˆซ์ž๊ฐ€ ๋ฏธ๊ตญ์„ ์•ž์งˆ๋ €๋‹คโ€๊ณ  ํ•จ.
๏ฎ ๋”์šฑ์ด ๋‹น์‹œ ์ •๋ถ€์˜ ๋ณ„๋„ ๊ทœ์ œ๊ฐ€ ์—†์—ˆ์Œ. ๊ฐœ์ธ ์—ฐ
๊ฐ„ ํ•ด์™ธ์†ก๊ธˆ ๊ฐ€๋Šฅ์•ก์ด 5๋งŒ ๋‹ฌ๋Ÿฌ ์ œํ•œ๋˜์–ด ์žˆ์—ˆ์ง€
๋งŒ ๋น„ํŠธ์ฝ”์ธ์€ ์ œ์•ฝ์ด ์—†์—ˆ๊ณ , ํ•ด์™ธ ์†ก๊ธˆ์‹œ ๋ณ„๋„
์ˆ˜์ˆ˜๋ฃŒ๋„ ์—†์—ˆ์Œ.
๏ฎ ์ด๋“ค์€ ๋น„ํŠธ์ฝ”์ธ์ด ์‹ค์šฉ์ ์ธ ํ™”ํ๊ฐ€ ๋  ์ˆ˜ ์žˆ๊ณ ,
๊ธˆ ๋Œ€์ฒด์žฌ๋กœ์„œ์˜ ๊ฐ€๋Šฅ์„ฑ ์ถฉ๋ถ„ํ•˜๋‹ค ์ƒ๊ฐํ•จ. ๋”์šฑ์ด
์ •๋ถ€์˜ ๊ฐ์‹œ๋ฅผ ํ”ผํ•  ์ˆ˜ ์žˆ๋‹ค๋Š” ์ ์ด ์ˆ˜์š”๋ฅผ ํญ๋ฐœ์‹œ
ํ‚ด.
๊ฐ€๊ฒฉ ๋ณ€๋™์„ฑ
44
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
45
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
46
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
47
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
ํƒˆ์ค‘์•™ํ™”(Decentralization) ๋ฌธ์ œ
(Jordan Tuwiner, "Bitcoin Mining Pools", July 13, 2017)
48
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
49
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
๏ฎ ๋˜ํ•œ ๋‹ค์ˆ˜์˜ ์ฑ„๊ตด(mining) ์žฅ๋น„๋ฅผ ๋ณด์œ ํ•œ
์ฐธ๊ฐ€์ž๋“ค์ด ๋ญ‰์น˜๋ฉด์„œ ์ง‘๋‹จํ™”ใ€ฎ์„ธ๋ ฅํ™” ๋˜๊ธฐ
์‹œ์ž‘ํ•จ.
50
ํƒˆ์ค‘์•™ํ™”(Decentralization) ๋ฌธ์ œ
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
๏ฎ ๋˜ํ•œ ๋‹ค์ˆ˜์˜ ์ฑ„๊ตด(mining) ์žฅ๋น„๋ฅผ ๋ณด์œ ํ•œ
์ฐธ๊ฐ€์ž๋“ค์ด ๋ญ‰์น˜๋ฉด์„œ ์ง‘๋‹จํ™”ใ€ฎ์„ธ๋ ฅํ™” ๋˜๊ธฐ
์‹œ์ž‘ํ•จ.
(Jordan Tuwiner, "Bitcoin Mining Pools", July 13, 2017) 51
ํƒˆ์ค‘์•™ํ™”(Decentralization) ๋ฌธ์ œ
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
52
ํƒˆ์ค‘์•™ํ™”(Decentralization) ๋ฌธ์ œ
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
(Financial Cryptography and Data Security 2018)
Neither are all that decentralized!
Both Bitcoin and Ethereum mining are very
centralized, with the top 4 miners in Bitcoin and
the top 3 miners in Ethereum controlling more
than 50% of the hash rate.
53
ํƒˆ์ค‘์•™ํ™”(Decentralization) ๋ฌธ์ œ
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
SCALABILITY
(ํ™•์žฅ์„ฑ)
CONSENSUS
(ํ•ฉ์˜)
ํ™•์žฅ์„ฑ(Scalability) ๋ฌธ์ œ
54
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
๏ฎ Blockchain์˜ ์ข…๋ฅ˜
๏ฎ ๋…์žฌ : ์ค‘์•™์ง‘์ค‘ํ˜• ๋˜๋Š” Private Blockchains
๏ฎ ๊ฐ„์ ‘ ๋ฏผ์ฃผ์ฃผ์˜ : Consortium(Federated)
Blockchains
๏ฎ R3, B3I, EWF, Corda, etcโ€ฆ
๏ฎ ์ง์ ‘ ๋ฏผ์ฃผ์ฃผ์˜ : Public Blockchains
๏ฎ Bitcoin, Ethereum, Monero, Litecoin, etcโ€ฆ
Scalability
Consensus
55
ํ™•์žฅ์„ฑ(Scalability) ๋ฌธ์ œ
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
์—๋„ˆ์ง€ ๋‚ญ๋น„ ๋ฌธ์ œ
56
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
์—๋„ˆ์ง€
๋‚ญ๋น„ ๋ฌธ์ œ
57
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
58
์—๋„ˆ์ง€ ๋‚ญ๋น„ ๋ฌธ์ œ
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
59
์—๋„ˆ์ง€ ๋‚ญ๋น„ ๋ฌธ์ œ
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
60
์—๋„ˆ์ง€ ๋‚ญ๋น„ ๋ฌธ์ œ
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
61
๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ๋ฌธ์ œ
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
62
๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ๋ฌธ์ œ
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
(Financial Cryptography and Data Security 2018)
Our quantitative analysis shows that 1.4% of the
roughly 251 million transactions in Bitcoin's
blockchain contained data that had nothing to do
with bitcoin. Among these files there may be
objectionable contents such as links to child
pornography, copyright violations, privacy violations,
politically sensitive content, malware, etc.
63
๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ๋ฌธ์ œ
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
๊ฑฐ๋ž˜์†Œ ํ•ดํ‚น ๋ฐ ํˆฌ๋ช…์„ฑ
64
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
๊ฑฐ๋ž˜์†Œ ํ•ดํ‚น ๋ฐ ํˆฌ๋ช…์„ฑ
65
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
๏ถ ยฉ2021 by Seungjoo Gabriel Kim. Permission to
make digital or hard copies of part or all of this
material is currently granted without fee
provided that copies are made only for personal
or classroom use, are not distributed for profit
or commercial advantage, and that new copies
bear this notice and the full citation.
66
๊ณ ๋ ค๋Œ€ํ•™๊ต์ •๋ณด๋ณดํ˜ธ๋Œ€ํ•™์›
๋งˆ์Šคํ„ฐ ์ œ๋ชฉ ์Šคํƒ€์ผ ํŽธ์ง‘
67
Blockchain Overview &
Introduction
- Technical Concepts of Blockchain Systems -

More Related Content

Similar to [Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -

[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
Seungjoo Kim
ย 
JTBC ์ฐจ์ด๋‚˜๋Š” ํด๋ผ์Šค [62๊ฐ•] '๋ธ”๋ก์ฒด์ธ, ์‹ ์„ธ๊ณ„์ธ๊ฐ€? ์‹ ๊ธฐ๋ฃจ์ธ๊ฐ€?' (2018.5.23)
JTBC ์ฐจ์ด๋‚˜๋Š” ํด๋ผ์Šค [62๊ฐ•] '๋ธ”๋ก์ฒด์ธ, ์‹ ์„ธ๊ณ„์ธ๊ฐ€? ์‹ ๊ธฐ๋ฃจ์ธ๊ฐ€?' (2018.5.23)JTBC ์ฐจ์ด๋‚˜๋Š” ํด๋ผ์Šค [62๊ฐ•] '๋ธ”๋ก์ฒด์ธ, ์‹ ์„ธ๊ณ„์ธ๊ฐ€? ์‹ ๊ธฐ๋ฃจ์ธ๊ฐ€?' (2018.5.23)
JTBC ์ฐจ์ด๋‚˜๋Š” ํด๋ผ์Šค [62๊ฐ•] '๋ธ”๋ก์ฒด์ธ, ์‹ ์„ธ๊ณ„์ธ๊ฐ€? ์‹ ๊ธฐ๋ฃจ์ธ๊ฐ€?' (2018.5.23)
Seungjoo Kim
ย 
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
Seungjoo Kim
ย 
๋ธ”๋ก์ฒด์ธ์˜ ๋ณธ์งˆ๊ณผ ๋™์ž‘ ์›๋ฆฌ
๋ธ”๋ก์ฒด์ธ์˜ ๋ณธ์งˆ๊ณผ ๋™์ž‘ ์›๋ฆฌ๋ธ”๋ก์ฒด์ธ์˜ ๋ณธ์งˆ๊ณผ ๋™์ž‘ ์›๋ฆฌ
๋ธ”๋ก์ฒด์ธ์˜ ๋ณธ์งˆ๊ณผ ๋™์ž‘ ์›๋ฆฌ
Seungjoo Kim
ย 
Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)
Seungjoo Kim
ย 
[Krnet2018] blockchain and cryptocurrency v1.01
[Krnet2018] blockchain and cryptocurrency v1.01[Krnet2018] blockchain and cryptocurrency v1.01
[Krnet2018] blockchain and cryptocurrency v1.01
Eunseong Kang
ย 
190320 [ict convergence 2019] blockchain financing
190320 [ict convergence 2019] blockchain financing190320 [ict convergence 2019] blockchain financing
190320 [ict convergence 2019] blockchain financing
Eunseong Kang
ย 
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
Seungjoo Kim
ย 
[WeFocus] ๋ธ”๋ก์ฒด์ธ ํŠนํ—ˆ ํ™•๋ณด ์ „๋žต_20180916_ver2.0
[WeFocus] ๋ธ”๋ก์ฒด์ธ ํŠนํ—ˆ ํ™•๋ณด ์ „๋žต_20180916_ver2.0[WeFocus] ๋ธ”๋ก์ฒด์ธ ํŠนํ—ˆ ํ™•๋ณด ์ „๋žต_20180916_ver2.0
[WeFocus] ๋ธ”๋ก์ฒด์ธ ํŠนํ—ˆ ํ™•๋ณด ์ „๋žต_20180916_ver2.0
Luke Sunghyun Kim
ย 
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
Seungjoo Kim
ย 
๋ธ”๋ก์ฒด์ธ ์ด์Šˆ์™€ ์ „๋ง New db
๋ธ”๋ก์ฒด์ธ ์ด์Šˆ์™€ ์ „๋ง New db๋ธ”๋ก์ฒด์ธ ์ด์Šˆ์™€ ์ „๋ง New db
๋ธ”๋ก์ฒด์ธ ์ด์Šˆ์™€ ์ „๋ง New db
HongSuk Seo
ย 
[WeFocus] ๋ธ”๋ก์ฒด์ธ ํŠนํ—ˆ ํ™•๋ณด ์ „๋žต_20180916
[WeFocus] ๋ธ”๋ก์ฒด์ธ ํŠนํ—ˆ ํ™•๋ณด ์ „๋žต_20180916[WeFocus] ๋ธ”๋ก์ฒด์ธ ํŠนํ—ˆ ํ™•๋ณด ์ „๋žต_20180916
[WeFocus] ๋ธ”๋ก์ฒด์ธ ํŠนํ—ˆ ํ™•๋ณด ์ „๋žต_20180916
Luke Sunghyun Kim
ย 
Introblockchaininfra 180806105137
Introblockchaininfra 180806105137Introblockchaininfra 180806105137
Introblockchaininfra 180806105137
Jong-Ki Lee
ย 
Blockchain and future -- SNU Hospital Invitation
Blockchain and future  -- SNU Hospital InvitationBlockchain and future  -- SNU Hospital Invitation
Blockchain and future -- SNU Hospital Invitation
Heung-No Lee
ย 
๋ธ”๋ก์ฒด์ธ ๊ฐœ์š”
๋ธ”๋ก์ฒด์ธ ๊ฐœ์š”๋ธ”๋ก์ฒด์ธ ๊ฐœ์š”
๋ธ”๋ก์ฒด์ธ ๊ฐœ์š”
Jeff Paik
ย 
Iost x ABC Lab meetup ver1.0
Iost x ABC Lab meetup ver1.0Iost x ABC Lab meetup ver1.0
Iost x ABC Lab meetup ver1.0
Blake Jeong
ย 
๋ฏธ๋ž˜-์ƒ์ƒ ํ˜„์‹ค์ด ๋˜๋‹ค_4_๋ธ”๋ก์ฒด์ธ์˜ ํ˜„์žฌ์™€ ๋ฏธ๋ž˜
๋ฏธ๋ž˜-์ƒ์ƒ ํ˜„์‹ค์ด ๋˜๋‹ค_4_๋ธ”๋ก์ฒด์ธ์˜ ํ˜„์žฌ์™€ ๋ฏธ๋ž˜๋ฏธ๋ž˜-์ƒ์ƒ ํ˜„์‹ค์ด ๋˜๋‹ค_4_๋ธ”๋ก์ฒด์ธ์˜ ํ˜„์žฌ์™€ ๋ฏธ๋ž˜
๋ฏธ๋ž˜-์ƒ์ƒ ํ˜„์‹ค์ด ๋˜๋‹ค_4_๋ธ”๋ก์ฒด์ธ์˜ ํ˜„์žฌ์™€ ๋ฏธ๋ž˜
wycha
ย 
์ฝ”์Šค๋ชจ์Šค ๋ธ”๋ก์ฒด์ธ #1
์ฝ”์Šค๋ชจ์Šค ๋ธ”๋ก์ฒด์ธ #1์ฝ”์Šค๋ชจ์Šค ๋ธ”๋ก์ฒด์ธ #1
์ฝ”์Šค๋ชจ์Šค ๋ธ”๋ก์ฒด์ธ #1
Sung Wan Yoon
ย 
๋ธ”๋ก์ฒด์ธ์ด ๊ฐ€์ ธ์˜ฌ ์ƒˆ๋กœ์šด ํŒจ๋Ÿฌ๋‹ค์ž„
๋ธ”๋ก์ฒด์ธ์ด ๊ฐ€์ ธ์˜ฌ ์ƒˆ๋กœ์šด ํŒจ๋Ÿฌ๋‹ค์ž„๋ธ”๋ก์ฒด์ธ์ด ๊ฐ€์ ธ์˜ฌ ์ƒˆ๋กœ์šด ํŒจ๋Ÿฌ๋‹ค์ž„
๋ธ”๋ก์ฒด์ธ์ด ๊ฐ€์ ธ์˜ฌ ์ƒˆ๋กœ์šด ํŒจ๋Ÿฌ๋‹ค์ž„
Jae-Yun Kim
ย 
๋ธ”๋ก ์ฒด์ธ ๊ธฐ์ˆ  ์›๋ฆฌ, ์ด์šฉ ํ˜„ํ™ฉ, ์ „๋ง๊ณผ ํ™œ์šฉ ๋ถ„์•ผ.
๋ธ”๋ก ์ฒด์ธ ๊ธฐ์ˆ  ์›๋ฆฌ,  ์ด์šฉ ํ˜„ํ™ฉ, ์ „๋ง๊ณผ ํ™œ์šฉ ๋ถ„์•ผ. ๋ธ”๋ก ์ฒด์ธ ๊ธฐ์ˆ  ์›๋ฆฌ,  ์ด์šฉ ํ˜„ํ™ฉ, ์ „๋ง๊ณผ ํ™œ์šฉ ๋ถ„์•ผ.
๋ธ”๋ก ์ฒด์ธ ๊ธฐ์ˆ  ์›๋ฆฌ, ์ด์šฉ ํ˜„ํ™ฉ, ์ „๋ง๊ณผ ํ™œ์šฉ ๋ถ„์•ผ.
JaeGon Lim
ย 

Similar to [Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems - (20)

[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
[Blockchain and Cryptocurrency] 04. Bitcoin and Nakamoto Blockchain
ย 
JTBC ์ฐจ์ด๋‚˜๋Š” ํด๋ผ์Šค [62๊ฐ•] '๋ธ”๋ก์ฒด์ธ, ์‹ ์„ธ๊ณ„์ธ๊ฐ€? ์‹ ๊ธฐ๋ฃจ์ธ๊ฐ€?' (2018.5.23)
JTBC ์ฐจ์ด๋‚˜๋Š” ํด๋ผ์Šค [62๊ฐ•] '๋ธ”๋ก์ฒด์ธ, ์‹ ์„ธ๊ณ„์ธ๊ฐ€? ์‹ ๊ธฐ๋ฃจ์ธ๊ฐ€?' (2018.5.23)JTBC ์ฐจ์ด๋‚˜๋Š” ํด๋ผ์Šค [62๊ฐ•] '๋ธ”๋ก์ฒด์ธ, ์‹ ์„ธ๊ณ„์ธ๊ฐ€? ์‹ ๊ธฐ๋ฃจ์ธ๊ฐ€?' (2018.5.23)
JTBC ์ฐจ์ด๋‚˜๋Š” ํด๋ผ์Šค [62๊ฐ•] '๋ธ”๋ก์ฒด์ธ, ์‹ ์„ธ๊ณ„์ธ๊ฐ€? ์‹ ๊ธฐ๋ฃจ์ธ๊ฐ€?' (2018.5.23)
ย 
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
[Blockchain and Cryptocurrency] 09. Blockchain Usage Beyond Currency - Way to...
ย 
๋ธ”๋ก์ฒด์ธ์˜ ๋ณธ์งˆ๊ณผ ๋™์ž‘ ์›๋ฆฌ
๋ธ”๋ก์ฒด์ธ์˜ ๋ณธ์งˆ๊ณผ ๋™์ž‘ ์›๋ฆฌ๋ธ”๋ก์ฒด์ธ์˜ ๋ณธ์งˆ๊ณผ ๋™์ž‘ ์›๋ฆฌ
๋ธ”๋ก์ฒด์ธ์˜ ๋ณธ์งˆ๊ณผ ๋™์ž‘ ์›๋ฆฌ
ย 
Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)Kid Blockchain - Everything You Need to Know - (Part 1)
Kid Blockchain - Everything You Need to Know - (Part 1)
ย 
[Krnet2018] blockchain and cryptocurrency v1.01
[Krnet2018] blockchain and cryptocurrency v1.01[Krnet2018] blockchain and cryptocurrency v1.01
[Krnet2018] blockchain and cryptocurrency v1.01
ย 
190320 [ict convergence 2019] blockchain financing
190320 [ict convergence 2019] blockchain financing190320 [ict convergence 2019] blockchain financing
190320 [ict convergence 2019] blockchain financing
ย 
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
[Blockchain and Cryptocurrency] 07. Cardano(ADA) and Other Altcoins
ย 
[WeFocus] ๋ธ”๋ก์ฒด์ธ ํŠนํ—ˆ ํ™•๋ณด ์ „๋žต_20180916_ver2.0
[WeFocus] ๋ธ”๋ก์ฒด์ธ ํŠนํ—ˆ ํ™•๋ณด ์ „๋žต_20180916_ver2.0[WeFocus] ๋ธ”๋ก์ฒด์ธ ํŠนํ—ˆ ํ™•๋ณด ์ „๋žต_20180916_ver2.0
[WeFocus] ๋ธ”๋ก์ฒด์ธ ํŠนํ—ˆ ํ™•๋ณด ์ „๋žต_20180916_ver2.0
ย 
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse[Blockchain and Cryptocurrency] 06. NFT and Metaverse
[Blockchain and Cryptocurrency] 06. NFT and Metaverse
ย 
๋ธ”๋ก์ฒด์ธ ์ด์Šˆ์™€ ์ „๋ง New db
๋ธ”๋ก์ฒด์ธ ์ด์Šˆ์™€ ์ „๋ง New db๋ธ”๋ก์ฒด์ธ ์ด์Šˆ์™€ ์ „๋ง New db
๋ธ”๋ก์ฒด์ธ ์ด์Šˆ์™€ ์ „๋ง New db
ย 
[WeFocus] ๋ธ”๋ก์ฒด์ธ ํŠนํ—ˆ ํ™•๋ณด ์ „๋žต_20180916
[WeFocus] ๋ธ”๋ก์ฒด์ธ ํŠนํ—ˆ ํ™•๋ณด ์ „๋žต_20180916[WeFocus] ๋ธ”๋ก์ฒด์ธ ํŠนํ—ˆ ํ™•๋ณด ์ „๋žต_20180916
[WeFocus] ๋ธ”๋ก์ฒด์ธ ํŠนํ—ˆ ํ™•๋ณด ์ „๋žต_20180916
ย 
Introblockchaininfra 180806105137
Introblockchaininfra 180806105137Introblockchaininfra 180806105137
Introblockchaininfra 180806105137
ย 
Blockchain and future -- SNU Hospital Invitation
Blockchain and future  -- SNU Hospital InvitationBlockchain and future  -- SNU Hospital Invitation
Blockchain and future -- SNU Hospital Invitation
ย 
๋ธ”๋ก์ฒด์ธ ๊ฐœ์š”
๋ธ”๋ก์ฒด์ธ ๊ฐœ์š”๋ธ”๋ก์ฒด์ธ ๊ฐœ์š”
๋ธ”๋ก์ฒด์ธ ๊ฐœ์š”
ย 
Iost x ABC Lab meetup ver1.0
Iost x ABC Lab meetup ver1.0Iost x ABC Lab meetup ver1.0
Iost x ABC Lab meetup ver1.0
ย 
๋ฏธ๋ž˜-์ƒ์ƒ ํ˜„์‹ค์ด ๋˜๋‹ค_4_๋ธ”๋ก์ฒด์ธ์˜ ํ˜„์žฌ์™€ ๋ฏธ๋ž˜
๋ฏธ๋ž˜-์ƒ์ƒ ํ˜„์‹ค์ด ๋˜๋‹ค_4_๋ธ”๋ก์ฒด์ธ์˜ ํ˜„์žฌ์™€ ๋ฏธ๋ž˜๋ฏธ๋ž˜-์ƒ์ƒ ํ˜„์‹ค์ด ๋˜๋‹ค_4_๋ธ”๋ก์ฒด์ธ์˜ ํ˜„์žฌ์™€ ๋ฏธ๋ž˜
๋ฏธ๋ž˜-์ƒ์ƒ ํ˜„์‹ค์ด ๋˜๋‹ค_4_๋ธ”๋ก์ฒด์ธ์˜ ํ˜„์žฌ์™€ ๋ฏธ๋ž˜
ย 
์ฝ”์Šค๋ชจ์Šค ๋ธ”๋ก์ฒด์ธ #1
์ฝ”์Šค๋ชจ์Šค ๋ธ”๋ก์ฒด์ธ #1์ฝ”์Šค๋ชจ์Šค ๋ธ”๋ก์ฒด์ธ #1
์ฝ”์Šค๋ชจ์Šค ๋ธ”๋ก์ฒด์ธ #1
ย 
๋ธ”๋ก์ฒด์ธ์ด ๊ฐ€์ ธ์˜ฌ ์ƒˆ๋กœ์šด ํŒจ๋Ÿฌ๋‹ค์ž„
๋ธ”๋ก์ฒด์ธ์ด ๊ฐ€์ ธ์˜ฌ ์ƒˆ๋กœ์šด ํŒจ๋Ÿฌ๋‹ค์ž„๋ธ”๋ก์ฒด์ธ์ด ๊ฐ€์ ธ์˜ฌ ์ƒˆ๋กœ์šด ํŒจ๋Ÿฌ๋‹ค์ž„
๋ธ”๋ก์ฒด์ธ์ด ๊ฐ€์ ธ์˜ฌ ์ƒˆ๋กœ์šด ํŒจ๋Ÿฌ๋‹ค์ž„
ย 
๋ธ”๋ก ์ฒด์ธ ๊ธฐ์ˆ  ์›๋ฆฌ, ์ด์šฉ ํ˜„ํ™ฉ, ์ „๋ง๊ณผ ํ™œ์šฉ ๋ถ„์•ผ.
๋ธ”๋ก ์ฒด์ธ ๊ธฐ์ˆ  ์›๋ฆฌ,  ์ด์šฉ ํ˜„ํ™ฉ, ์ „๋ง๊ณผ ํ™œ์šฉ ๋ถ„์•ผ. ๋ธ”๋ก ์ฒด์ธ ๊ธฐ์ˆ  ์›๋ฆฌ,  ์ด์šฉ ํ˜„ํ™ฉ, ์ „๋ง๊ณผ ํ™œ์šฉ ๋ถ„์•ผ.
๋ธ”๋ก ์ฒด์ธ ๊ธฐ์ˆ  ์›๋ฆฌ, ์ด์šฉ ํ˜„ํ™ฉ, ์ „๋ง๊ณผ ํ™œ์šฉ ๋ถ„์•ผ.
ย 

More from Seungjoo Kim

[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus
Seungjoo Kim
ย 
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
Seungjoo Kim
ย 
[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins
Seungjoo Kim
ย 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Seungjoo Kim
ย 
Application of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLCApplication of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLC
Seungjoo Kim
ย 
Assurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessAssurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC Process
Seungjoo Kim
ย 
How South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber ThreatsHow South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber Threats
Seungjoo Kim
ย 
Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?
Seungjoo Kim
ย 
Post-Coronavirus ์‹œ๋Œ€ ๋ณด์•ˆ ํŒจ๋Ÿฌ๋‹ค์ž„์˜ ๋ณ€ํ™”
Post-Coronavirus ์‹œ๋Œ€ ๋ณด์•ˆ ํŒจ๋Ÿฌ๋‹ค์ž„์˜ ๋ณ€ํ™”Post-Coronavirus ์‹œ๋Œ€ ๋ณด์•ˆ ํŒจ๋Ÿฌ๋‹ค์ž„์˜ ๋ณ€ํ™”
Post-Coronavirus ์‹œ๋Œ€ ๋ณด์•ˆ ํŒจ๋Ÿฌ๋‹ค์ž„์˜ ๋ณ€ํ™”
Seungjoo Kim
ย 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
Seungjoo Kim
ย 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCL
Seungjoo Kim
ย 
ํ”„๋ผ์ด๋ฒ„์‹œ ๋”œ๋ ˆ๋งˆ - HTTPS ์ฐจ๋‹จ, ์•ฝ์ธ๊ฐ€ ๋…์ธ๊ฐ€? -
ํ”„๋ผ์ด๋ฒ„์‹œ ๋”œ๋ ˆ๋งˆ - HTTPS ์ฐจ๋‹จ, ์•ฝ์ธ๊ฐ€ ๋…์ธ๊ฐ€? -ํ”„๋ผ์ด๋ฒ„์‹œ ๋”œ๋ ˆ๋งˆ - HTTPS ์ฐจ๋‹จ, ์•ฝ์ธ๊ฐ€ ๋…์ธ๊ฐ€? -
ํ”„๋ผ์ด๋ฒ„์‹œ ๋”œ๋ ˆ๋งˆ - HTTPS ์ฐจ๋‹จ, ์•ฝ์ธ๊ฐ€ ๋…์ธ๊ฐ€? -
Seungjoo Kim
ย 
Security Paradigm Change in Industry 4.0
Security Paradigm Change in Industry 4.0Security Paradigm Change in Industry 4.0
Security Paradigm Change in Industry 4.0
Seungjoo Kim
ย 
New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)
Seungjoo Kim
ย 
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...
Seungjoo Kim
ย 
Hack-Proof Drone, What is it? - Weapons Systems and Cyber Security -
Hack-Proof Drone, What is it? - Weapons Systems and Cyber Security -Hack-Proof Drone, What is it? - Weapons Systems and Cyber Security -
Hack-Proof Drone, What is it? - Weapons Systems and Cyber Security -
Seungjoo Kim
ย 
MS Threat Modeling Tool 2017 User's Guide
MS Threat Modeling Tool 2017 User's GuideMS Threat Modeling Tool 2017 User's Guide
MS Threat Modeling Tool 2017 User's Guide
Seungjoo Kim
ย 
Network Separation Policy in Korea
 Network Separation Policy in Korea Network Separation Policy in Korea
Network Separation Policy in Korea
Seungjoo Kim
ย 
Deep Learning Based Real-Time DNS DDoS Detection System
Deep Learning Based Real-Time DNS DDoS Detection SystemDeep Learning Based Real-Time DNS DDoS Detection System
Deep Learning Based Real-Time DNS DDoS Detection System
Seungjoo Kim
ย 
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Seungjoo Kim
ย 

More from Seungjoo Kim (20)

[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus[Blockchain and Cryptocurrency] 01. Syllabus
[Blockchain and Cryptocurrency] 01. Syllabus
ย 
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
[Blockchain and Cryptocurrency] 03. Blockchain's Theoretical Foundation, Cryp...
ย 
[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins[Blockchain and Cryptocurrency] 08. Dark Coins
[Blockchain and Cryptocurrency] 08. Dark Coins
ย 
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
Why is it getting harder to train the cybersecurity workforce? (ExtendedVersion)
ย 
Application of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLCApplication of the Common Criteria to Building Trustworthy Automotive SDLC
Application of the Common Criteria to Building Trustworthy Automotive SDLC
ย 
Assurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC ProcessAssurance-Level Driven Method for Integrating Security into SDLC Process
Assurance-Level Driven Method for Integrating Security into SDLC Process
ย 
How South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber ThreatsHow South Korea Is Fighting North Korea's Cyber Threats
How South Korea Is Fighting North Korea's Cyber Threats
ย 
Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?Blockchain for Cyber Defense: Will It Be As Good As You Think?
Blockchain for Cyber Defense: Will It Be As Good As You Think?
ย 
Post-Coronavirus ์‹œ๋Œ€ ๋ณด์•ˆ ํŒจ๋Ÿฌ๋‹ค์ž„์˜ ๋ณ€ํ™”
Post-Coronavirus ์‹œ๋Œ€ ๋ณด์•ˆ ํŒจ๋Ÿฌ๋‹ค์ž„์˜ ๋ณ€ํ™”Post-Coronavirus ์‹œ๋Œ€ ๋ณด์•ˆ ํŒจ๋Ÿฌ๋‹ค์ž„์˜ ๋ณ€ํ™”
Post-Coronavirus ์‹œ๋Œ€ ๋ณด์•ˆ ํŒจ๋Ÿฌ๋‹ค์ž„์˜ ๋ณ€ํ™”
ย 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
ย 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCL
ย 
ํ”„๋ผ์ด๋ฒ„์‹œ ๋”œ๋ ˆ๋งˆ - HTTPS ์ฐจ๋‹จ, ์•ฝ์ธ๊ฐ€ ๋…์ธ๊ฐ€? -
ํ”„๋ผ์ด๋ฒ„์‹œ ๋”œ๋ ˆ๋งˆ - HTTPS ์ฐจ๋‹จ, ์•ฝ์ธ๊ฐ€ ๋…์ธ๊ฐ€? -ํ”„๋ผ์ด๋ฒ„์‹œ ๋”œ๋ ˆ๋งˆ - HTTPS ์ฐจ๋‹จ, ์•ฝ์ธ๊ฐ€ ๋…์ธ๊ฐ€? -
ํ”„๋ผ์ด๋ฒ„์‹œ ๋”œ๋ ˆ๋งˆ - HTTPS ์ฐจ๋‹จ, ์•ฝ์ธ๊ฐ€ ๋…์ธ๊ฐ€? -
ย 
Security Paradigm Change in Industry 4.0
Security Paradigm Change in Industry 4.0Security Paradigm Change in Industry 4.0
Security Paradigm Change in Industry 4.0
ย 
New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)New Threat Trends in CII(Critical Information Infrastructure)
New Threat Trends in CII(Critical Information Infrastructure)
ย 
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...
Virtual Currency Myth and Reality (Ver. 3.0 (182 pages) : Extended Version of...
ย 
Hack-Proof Drone, What is it? - Weapons Systems and Cyber Security -
Hack-Proof Drone, What is it? - Weapons Systems and Cyber Security -Hack-Proof Drone, What is it? - Weapons Systems and Cyber Security -
Hack-Proof Drone, What is it? - Weapons Systems and Cyber Security -
ย 
MS Threat Modeling Tool 2017 User's Guide
MS Threat Modeling Tool 2017 User's GuideMS Threat Modeling Tool 2017 User's Guide
MS Threat Modeling Tool 2017 User's Guide
ย 
Network Separation Policy in Korea
 Network Separation Policy in Korea Network Separation Policy in Korea
Network Separation Policy in Korea
ย 
Deep Learning Based Real-Time DNS DDoS Detection System
Deep Learning Based Real-Time DNS DDoS Detection SystemDeep Learning Based Real-Time DNS DDoS Detection System
Deep Learning Based Real-Time DNS DDoS Detection System
ย 
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
Using the CGC's Fully Automated Vulnerability Detection Tools in Security Eva...
ย 

[Blockchain and Cryptocurrency] 02. Blockchain Overview and Introduction - Technical Concepts of Blockchain Systems -