Apparatus, system and method for detecting and preventing malicious scripts using code pattern-based static analysis and API flow-based dynamic analysis

HK Kim, JH Jung, HC Bae, HR Choo, W Jang… - US Patent …, 2017 - Google Patents
Provided are an apparatus, a system and a method for detecting and preventing malicious
scripts. The apparatus for detecting and preventing malicious scripts includes a signature …

Malware analysis mechanism using the word cloud based on API statistics

ST Yu, SH Oh - Journal of the Korea Academia-Industrial …, 2015 - koreascience.kr
Tens of thousands of malicious codes are generated on average in a day. New types of
malicious codes are surging each year. Diverse methods are used to detect such codes …

[PDF][PDF] A Research of Anomaly Detection Method in MS Office Document

SH Cho, SJ Lee - KIPS Transactions on Computer and …, 2017 - scholar.archive.org
Microsoft Office is an office suite of applications developed by Microsoft. Recently users with
malicious intent customize Office files as a container of the Malware because MS Office is …

Stacked autoencoder based malware feature refinement technology research

H Kim, T Lee - Journal of the Korea Institute of Information Security …, 2020 - koreascience.kr
The advent of malicious code has increased exponentially due to the spread of malicious
code generation tools in accordance with the development of the network, but there is a limit …

A study of simple classification of malware based on the dynamic api call counts

J Kim, S Lee, JM Youn, H Choi - … Conference on Computer Science and its …, 2016 - Springer
Recently, as the rapid development of the Internet enabled easy downloading of diverse
files, the number of cases of file download from unreliable paths has been increasing. This …

[HTML][HTML] A Study on Malware Clustering Technique Using API Call Sequence and Locality Sensitive Hashing (API 콜시퀀스와Locality Sensitive Hashing 을이용한악성 …

DW Goh, HK Kim - Journal of the Korea Institute of Information …, 2017 - koreascience.kr
API call sequence analysis is a kind of analysis using API call information extracted in target
program. Compared to other techniques, this is advantageous as it can characterize the …

Design and implementation of mongoDB-based unstructured log processing system over cloud computing environment

M Kim, S Han, Y Cui, H Lee - Journal of Internet Computing and …, 2013 - koreascience.kr
Log data, which record the multitude of information created when operating computer
systems, are utilized in many processes, from carrying out computer system inspection and …

Designing SMS phishing profiling model

Y Jeong, K Lee, S Lee - Journal of The Korea Institute of …, 2015 - koreascience.kr
With the attack information collected during SMS phishing investigation, this paper will
propose SMS phishing profiling model applying criminal profiling. Law enforcement …

Detection of malicious code using the direct hashing and pruning and support vector machine

YJ Ju, MG Kim, JH Shin - Concurrency and Computation …, 2020 - Wiley Online Library
Although open application programming interfaces (APIs) have been improved by
advancements in the software industry, diverse types of malicious code have also increased …

Research on autoencdoer technology for malware feature purification

H Kim, T Lee - 2021 21st ACIS International Winter Conference …, 2021 - ieeexplore.ieee.org
The emergence of malicious codes has increased exponentially due to the spread of
malicious code creation tools with the development of the network, but there are limitations …