• Title/Summary/Keyword: Executable Content

Search Result 5, Processing Time 0.019 seconds

The Generation of the Function Calls Graph of an Obfuscated Execution Program Using Dynamic (동적 분석을 이용한 난독화 된 실행 프로그램의 함수 호출 그래프 생성 연구)

  • Se-Beom Cheon;DaeYoub Kim
    • Journal of IKEEE
    • /
    • v.27 no.1
    • /
    • pp.93-102
    • /
    • 2023
  • As one of the techniques for analyzing malicious code, techniques creating a sequence or a graph of function call relationships in an executable program and then analyzing the result are proposed. Such methods generally study function calling in the executable program code through static analysis and organize function call relationships into a sequence or a graph. However, in the case of an obfuscated executable program, it is difficult to analyze the function call relationship only with static analysis because the structure/content of the executable program file is different from the standard structure/content. In this paper, we propose a dynamic analysis method to analyze the function call relationship of an obfuscated execution program. We suggest constructing a function call relationship as a graph using the proposed technique.

기술 트랜드

  • Lee, Jeong-Hyo
    • Digital Contents
    • /
    • no.10 s.77
    • /
    • pp.38-44
    • /
    • 1999
  • 인터넷 사용인구의 증가와 사용 용도의 다양화로 인해서 초기 웹의 정적이고 단순함은 더 이상 사용자의 욕구를 충족 시킬 수 없었다. 이러한 욕구는 웹 페이지가 동적이며 더욱 다양한 기능을 갖도록 요구하였으며 자바, Active-X Control 등의 기술을 이용한 Executable Content가 등장하게 되었다. 그러나 이것은 내부 정보 유출 및 파일 삭제 등의 컴퓨터자원에 대한 불법적인 접근의 위험성이 증가하고 있다. 이런 보안상의 취약점에 대해 살펴본다.

  • PDF

An Integrated Authentication System for Mobile Codes (이동코드를 위한 통합 인증 시스템)

  • Bae, Seong-Hun;Lee, Su-Hyeon
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.535-542
    • /
    • 2001
  • Mobile codes such as Java, Java-Script, ActiveX, and Script code are loaded into a client system first and then run without any notice to the client user. Executing code by this mechanism may cause various security problems such as flowing out system information, deleting or modifying files, and exhausting system resources. In this paper we propose an integrated authentication system to establish the uniform security countermeasure on various mobile codes. The system helps to solve to problems mentioned above. An integrated authentication system allows to load into an interpreter using ACL (Access Control List) which sets up an access authority to the executable contents and communicates with an interpreter using client/server model.

  • PDF

Games Application Methodology for History Education: Case Study of Developing a Serious Game for History Education (역사교육에 대한 게임 활용 방안: 기능성 게임 개발사례를 중심으로)

  • Jung, ChanYong
    • Journal of Korea Game Society
    • /
    • v.18 no.6
    • /
    • pp.29-38
    • /
    • 2018
  • Although computer games seem to be efficient tools for facilitating and supporting situated learning in Europe, GBL(game based learning) is less likely in Korea. The objectives of this paper are to address the causes of the problem and evaluate a serious game for history GBL. We review various cases of history GBL projects in European School Net, commercial games and serious games which are related to history. We draw a demand of our game's structural type, learning criterion, basic model of instruction, and executable prototype from the analysis results. Scene management educators pursue and dependencies of turning points in the history are critical differentiator. An evaluation team of educators, learners, and edu-game managers evaluates that the prototype is suitable model for application in history instruction.

Visualized Execution Analyzer for the Java Class File (자바 클래스 파일에 대한 시각화 실행 분석기)

  • Ko, Kwang-Man
    • The KIPS Transactions:PartA
    • /
    • v.11A no.5
    • /
    • pp.319-324
    • /
    • 2004
  • The Java language is rapidly being adopted in the Internet. The distributed applications and their application range are being expanded beyond just a programing language and developed Into software applications. A variety of researches are going on with regard to the Java Virtual Machine runtime environment and methods of analyzing the Java class files and utilizing the information for applications. A class file is a converted file that is executable by the Java virtual machine. Analysis on the class file structure and the runtime processes will be convenient in arranging the decompilers and debugging the source programs. This paper is about the runtime process analyzer that presents the runtime processes, including class files, more visually. The content of a class file will be easily accessed and expressed as in a graphic user interface. The information in the class file displayed is divided into Constant_Pool, Class_file, Interface, Field, Method and Attribute with information on method area, operand stack and local variables expressed visually.