Abstract:
A method for checking information flow and detecting information leakage by analyzing action of a user is provided to systematically represent the user action causing the information flow and detect the information leakage by checking the information flow generated from access to a system object. Processes operated in an OS(Operating System) are recognized as context, which is defined as a set of object handle, related API(Application Programming Interface), a function list, and context information(S701). All possible relations among the context are represented(S704). The relation among the represented context is clearly represented as user action generated from a system(S706). The represented relation among the context is determined whether a target object for the action is used as function relation for an source object of other actions(S708). The target object for the action is recognized as the action corresponding to the dynamically expanded context relation when the target object for the action has the function relation(S712).
Abstract:
사용자 단말이 종료되고 재시작되는 상황에서도 지속적으로 동작하는 악성코드의 활동을 부팅 및 로그인 단계에서 차단하도록 하는 악성코드 활동 차단 장치 및 방법을 제시한다. 제시된 장치는 자동실행을 허용할 수 있는 파일의 정보목록 및 설정된 보안수준의 정보를 저장하는 저장부, 사용자 단말의 부팅 직후의 기설정된 통제시간 및 사용자 로그인 직후의 기설정된 통제시간을 계시하는 계시부, 및 사용자 단말이 부팅됨에 따라 부팅 직후 및 사용자 로그인 직후에 자동실행을 허용할 수 있는 파일의 정보목록 및 설정된 보안수준을 근거로 부팅 직후의 기설정된 통제시간 및 사용자 로그인 직후의 기설정된 통제시간 동안 실행시도 파일의 실행을 허용하거나 차단하는 제어부를 포함한다.
Abstract:
본 발명은 악성 코드 샘플을 실행하기 전과 후의 시스템 상태를 토대로 악성 코드를 검출하는 장치 및 그 방법에 관한 것이다. 악성 코드 검출 장치는 악성 코드 샘플이 실행되기 전 샘플 실행 시스템의 상태를 추출하는 단계, 악성 코드 샘플에 대한 정적 분석 및 동적 분석을 수행하는 단계, 악성 코드 샘플을 실행 한 후, 샘플 실행 시스템의 상태를 추출하고, 추출한 결과와 악성 코드 샘플이 실행되기 전 샘플 실행 시스템의 상태를 추출한 결과를 비교하여 시스템의 변경 정보를 획득하는 단계 및 정적 분석 및 동적 분석을 수행한 결과에 해당하는 정적 분석 정보 및 동적 분석 정보, 시스템의 변경 정보를 이용하여 악성 코드 샘플의 악성 행위 여부를 검출하는 단계를 포함한다.
Abstract:
PURPOSE: A distribution site identification method of an active-X control, security vulnerability detection method, and immunization method are provided to recognize the distribution of an active-X control. CONSTITUTION: A checking object URL is obtained by performing a search engine query in a distribution site identification server(S202,S203). The checking object URL is accessed through the implementation of a web browser(S204,S205). It is determined whether to use active-X control in the accessed detection target(S206). The information of the corresponding active-x control is collected and recorded in the distribution present condition DB(S208).
Abstract:
A method and a system for detecting an anomaly malicious code with a process behavior prediction technique are provided to detect the anomaly malicious code by making a prediction pattern based on combination between all behaviors generated from normal/malicious codes and related events, and comparing the prediction pattern with a behavior pattern generated from a new execution code. A database filtering module(200) filters malicious codes from execution codes executed in a system. A system resource monitoring module(3001) monitors system resources to collect individual event information generated from the executed execution codes. A reprocessing module(4001) reconfigures one integrated log representing a behavior property value of the execution codes by reprocessing the individual event information. A behavior prediction information processing module(500) extracts the behavior property value of an anomaly malicious behavior by inputting the integrated log in a learning algorithm. An anomaly malicious behavior detecting module(700) detects malicious behavior by comparing the anomaly malicious behavior property value extracted from the behavior prediction information processing module with behavior property value data reformed in the reprocessing module.
Abstract:
A system and a method for detecting a kernel backdoor through window network monitoring are provided to prevent illegal intrusion and information leakage caused from the kernel backdoor by transmitting information to a kernel backdoor detector in case that the information respectively received from a TDI(Transport Driver Interface) and NDIS(Network Driver Interface Specification) monitor is present at the same time. The TDI monitor(310) detects a network packet generated from a user process(350) and transmits detected network packet information to the kernel backdoor detector(300). The NDIS detector(320) detects the outgoing and incoming network packet network of a network protocol, and transmits the detected network packet information to the kernel backdoor detector. The kernel backdoor detector determines only the network packet passing the NDIS monitor as the kernel backdoor by analyzing a route of the network packet received from the TDI and NDIS monitor. The TDI monitor is placed between a user process layer and a network protocol layer including the kernel backdoor. The NDIS monitor is placed the network protocol layer and a mini port.