Patents by Inventor Yong Gu SHIN

Yong Gu SHIN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240118196
    Abstract: In the case of a gas in which several gases are mixed, a type and concentration of the gas may be incorrectly measured when measured using only an optical band-pass filter. The invention of the present application is directed to providing a technology in which a plurality of broadband band-pass filters having overlapping regions are provided to calculate a magnitude of absorption for each wavelength band for light passing through each broadband band-pass filter, thereby identifying the presence of a gas of interest and the presence of a gas other than the gas of interest.
    Type: Application
    Filed: September 8, 2023
    Publication date: April 11, 2024
    Inventors: Cheol Woo NAM, Byung Yul MOON, Eung Yul KIM, Jae Hwan KIM, Chun Ho SHIN, Kwang Hun PARK, Myun Gu CHOI, Chang Hwang CHOI, Yong Geol KIM, Jae Min JEON
  • Patent number: 11886589
    Abstract: A process wrapping method for bypassing native code anti-analysis includes receiving an execution instruction intended to run in an application from an Android framework when the application starts, extracting metadata of string and method from a compiled OAT file using an oatdump tool in the Android framework, determining if anti-analysis techniques are applied by comparing with information of a database (DB) based on the transmitted execution instruction and the extracted metadata, modifying the execution instruction based on the determined information when the anti-analysis technique is applied, and sending the modified execution instruction back to the Android framework. Accordingly, it is possible to provide an environment in which malicious applications to which anti-analysis techniques are applied can be easily analyzed.
    Type: Grant
    Filed: January 28, 2021
    Date of Patent: January 30, 2024
    Assignee: FOUNDATION OF SOONGSIL UNIVERSITY-INDUSTRY COOPERATION
    Inventors: Jeong Hyun Yi, Yong Gu Shin
  • Publication number: 20220164446
    Abstract: A process wrapping method for bypassing native code anti-analysis includes receiving an execution instruction intended to run in an application from an Android framework when the application starts, extracting metadata of string and method from a compiled OAT file using an oatdump tool in the Android framework, determining if anti-analysis techniques are applied by comparing with information of a database (DB) based on the transmitted execution instruction and the extracted metadata, modifying the execution instruction based on the determined information when the anti-analysis technique is applied, and sending the modified execution instruction back to the Android framework. Accordingly, it is possible to provide an environment in which malicious applications to which anti-analysis techniques are applied can be easily analyzed.
    Type: Application
    Filed: January 28, 2021
    Publication date: May 26, 2022
    Inventors: Jeong Hyun YI, Yong Gu SHIN
  • Patent number: 10878086
    Abstract: A dynamic code extraction-based automatic anti-analysis evasion and code logic analysis apparatus, includes: a recognition module that extracts a DEX file and a SO file by unpacking an execution code of an application and recognizes an analysis avoidance technique by comparing a signature which is included in the extracted DEX file and SO file; a instrumentation module that extracts a code to be analyzed from a byte code configuring the DEX file and a native code configuring the SO file, compares the extracted code with the data stored in a database, and outputs a code excluding an anti-analysis technique as a log file; and a deobfuscation module that deobfuscates an obfuscated code which is included in the APK on the basis of the output log file and generates an APK file in which an obfuscation technique is released on the basis of the deobfuscated code.
    Type: Grant
    Filed: November 22, 2018
    Date of Patent: December 29, 2020
    Assignee: Foundation of Soongsil University-Industry Cooperation
    Inventors: Jeong Hyun Yi, Jongsu Lim, Sun Jun Lee, Yong Gu Shin, Kyu Ho Kim
  • Publication number: 20200089873
    Abstract: A dynamic code extraction-based automatic anti-analysis evasion and code logic analysis apparatus, includes: a recognition module that extracts a DEX file and a SO file by unpacking an execution code of an application and recognizes an analysis avoidance technique by comparing a signature which is included in the extracted DEX file and SO file; a instrumentation module that extracts a code to be analyzed from a byte code configuring the DEX file and a native code configuring the SO file, compares the extracted code with the data stored in a database, and outputs a code excluding an anti-analysis technique as a log file; and a deobfuscation module that deobfuscates an obfuscated code which is included in the APK on the basis of the output log file and generates an APK file in which an obfuscation technique is released on the basis of the deobfuscated code.
    Type: Application
    Filed: November 22, 2018
    Publication date: March 19, 2020
    Applicant: Foundation of Soongsil University-Industry Cooperation
    Inventors: Jeong Hyun YI, Jongsu LIM, Sun Jun LEE, Yong Gu SHIN, Kyu Ho KIM