• Title/Summary/Keyword: Dynamic Link Library Injection

Search Result 3, Processing Time 0.016 seconds

A Study on an Engine Control System using an Object Oriented Programming Method (객체지향 프로그래밍 기법을 이용한 엔진제어시스템에 관한 연구)

  • 윤팔주;이상준;선우명호
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.8 no.3
    • /
    • pp.98-109
    • /
    • 2000
  • A new PC-based Engine Control system (ECS) is developed using an object oriented programming method. This system provides more convenient environment for engine tests, easier user interface and extended functions. A Windows-based ECS software is developed with class, and the class structure is built on encapsulation and abstraction. The closed-loop engine control scheme can be easily constructed by using dynamic link library and multitasking. This means that a user can perform desired experiments without clear knowledge of the hardware structure of the ECS. Also this system allows a user to individually control the ignition and fuel injection for each cylinder in a simple manner such as through a keyboard/mouse or in a real-time operation from a closed-loop control program.

  • PDF

A Countermeasure against a Whitelist-based Access Control Bypass Attack Using Dynamic DLL Injection Scheme (동적 DLL 삽입 기술을 이용한 화이트리스트 기반 접근통제 우회공격 대응 방안 연구)

  • Kim, Dae-Youb
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.380-388
    • /
    • 2022
  • The traditional malware detection technologies collect known malicious programs and analyze their characteristics. Then such a detection technology makes a blacklist based on the analyzed malicious characteristics and checks programs in the user's system based on the blacklist to determine whether each program is malware. However, such an approach can detect known malicious programs, but responding to unknown or variant malware is challenging. In addition, since such detection technologies generally monitor all programs in the system in real-time, there is a disadvantage that they can degrade the system performance. In order to solve such problems, various methods have been proposed to analyze major behaviors of malicious programs and to respond to them. The main characteristic of ransomware is to access and encrypt the user's file. So, a new approach is to produce the whitelist of programs installed in the user's system and allow the only programs listed on the whitelist to access the user's files. However, although it applies such an approach, attackers can still perform malicious behavior by performing a DLL(Dynamic-Link Library) injection attack on a regular program registered on the whitelist. This paper proposes a method to respond effectively to attacks using DLL injection.

Hierarchical Threads Generation-based Bypassing Attack on DLL Injection Monitoring System (계층화된 쓰레드 생성을 이용한 DLL 삽입 탐지기술 우회 공격 기법)

  • DaeYoub Kim
    • Journal of IKEEE
    • /
    • v.27 no.3
    • /
    • pp.239-245
    • /
    • 2023
  • Whitelist-based ransomware solution is known as being vulnerable to false impersonation attack using DLL injection attack. To solve this problem, it is proposed to monitor DLL injection attack and to integrate the monitoring result to ransomware solutions. In this paper, we show that attackers can easily bypass the monitoring mechanism and then illegally access files of a target system. It means that whitelist-based ransomware solutions are still vulnerable.