Patents by Inventor Young Tae Yun

Young Tae Yun has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8955124
    Abstract: Provided are an apparatus, system and method for detecting malicious code inserted into a normal process in disguise. The apparatus includes a malicious code detection module for extracting information on a thread generated by a process running on a computer system to identify code related to the thread, preliminarily determining whether or not the identified code is malicious and extracting the code preliminarily determined to be malicious; and a forcible malicious code termination module for finally determining the code as malicious code based on an analysis result of behavior of the extracted code executed in a virtual environment and forcibly terminating execution of the code.
    Type: Grant
    Filed: January 5, 2011
    Date of Patent: February 10, 2015
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Yo Sik Kim, Sang Kyun Noh, Yoon Jung Chung, Dong Soo Kim, Won Ho Kim, Yu Jung Han, Young Tae Yun, Ki Wook Sohn, Cheol Won Lee
  • Patent number: 8813226
    Abstract: A defense method and device against intelligent bots using masqueraded virtual machine information are provided. The method includes performing global hooking on a virtual machine detection request transmitted by a process, determining, on the basis of pre-stored malicious process information, whether or not the process transmitting the virtual machine detection request corresponds to a malicious process, and when the process is found to correspond to the malicious process as a result of the determination, determining that the process is generated by the intelligent bot, and returning the masqueraded virtual machine information to the process.
    Type: Grant
    Filed: September 10, 2010
    Date of Patent: August 19, 2014
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Yoon Jung Chung, Yo Sik Kim, Won Ho Kim, Dong Soo Kim, Sang Kyun Noh, Young Tae Yun, Cheol Won Lee
  • Patent number: 8706866
    Abstract: Provided are a virtual server and method for identifying a zombie, and a sinkhole server and method for integratedly managing zombie information. The virtual server includes an authentication processing module authenticating a host using a CAPTCHA test and providing a cookie to the authenticated host when a web server access request message received from the host does not include a cookie, a cookie value verification module for extracting a cookie value from the web server access request message and verifying the extracted cookie value when the web server access request message includes a cookie, a web page access inducement module for inducing the host to access a web server when the cookie value is verified, and a zombie identification module for blocking access of the host when the cookie value is not verified, and identifying the host as a zombie when the number of blocking operations exceeds a threshold value.
    Type: Grant
    Filed: January 6, 2011
    Date of Patent: April 22, 2014
    Assignee: Eletronics and Telecommunications Research Institute
    Inventors: Sang Kyun Noh, Young Tae Yun, Dong Soo Kim, Yo Sik Kim, Yoon Jung Chung, Won Ho Kim, Yu Jung Han, Cheol Won Lee
  • Patent number: 8539449
    Abstract: Provided is a device and method for inspecting software for vulnerabilities which fuzzes the software by function. The device for inspecting software for vulnerabilities includes a target function selecting module for selecting a function of the software for vulnerabilities to be inspected, a comparison file generating module for generating a first file including the selected function and a second file not including the selected function, a binary pattern comparing module for detecting a changed or added binary pattern by comparing binary values of the first file and the second file, a test case generating module for generating at least one test case based on the detected binary pattern, and a vulnerability verifying module for inspecting vulnerabilities based on the at least one test case and generating a vulnerability inspection result.
    Type: Grant
    Filed: April 14, 2008
    Date of Patent: September 17, 2013
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Eun Young Kim, Young Tae Yun, Eung Ki Park
  • Patent number: 8166543
    Abstract: Provided is an apparatus and method for detecting a malicious file that attempts to initiate communication in a mobile terminal without a user's approval. The method of detecting a malicious file in a mobile terminal includes: determining whether a file to be examined is an executable file; when the file is an executable file, examining whether the file is a malicious file that can cause unapproved communication based on at least one predetermined examination condition; and outputting the result of examining whether the file is the malicious file. Accordingly, an attack caused by a new type of malicious code can be coped with.
    Type: Grant
    Filed: June 19, 2008
    Date of Patent: April 24, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Jae Woo Park, Dong Su Nam, Yun Ju Kim, Young Tae Yun
  • Patent number: 8091133
    Abstract: Provided are an apparatus and method for detecting a malicious process. The apparatus includes: a process monitoring unit for monitoring a process generated in a computing environment; a target process setting unit for previously setting a test target process among the processes confirmed by the process monitoring unit; a process generation time change monitoring unit for monitoring if the target process set by the target process setting unit requests to change a generation time; a generation time change preventing unit for preventing a change in the generation time of the target process when the target process requests to change the generation time; and a malicious process detecting unit for determining that a child process of the target process set by the target process setting unit is a malicious process if the child process is generated within a predetermined reference time.
    Type: Grant
    Filed: April 16, 2008
    Date of Patent: January 3, 2012
    Assignee: Electronics and Telecommunications Research Institute
    Inventors: Yun Ju Kim, Young Tae Yun
  • Publication number: 20110271343
    Abstract: Provided are an apparatus, system and method for detecting malicious code inserted into a normal process in disguise. The apparatus includes a malicious code detection module for extracting information on a thread generated by a process running on a computer system to identify code related to the thread, preliminarily determining whether or not the identified code is malicious and extracting the code preliminarily determined to be malicious; and a forcible malicious code termination module for finally determining the code as malicious code based on an analysis result of behavior of the extracted code executed in a virtual environment and forcibly terminating execution of the code.
    Type: Application
    Filed: January 5, 2011
    Publication date: November 3, 2011
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Yo Sik Kim, Sang Kyun Noh, Yoon Jung Chung, Dong Soo Kim, Won Ho Kim, Yu Jung Han, Young Tae Yun, Ki Wook Sohn, Cheol Won Lee
  • Publication number: 20110270969
    Abstract: Provided are a virtual server and method for identifying a zombie, and a sinkhole server and method for integratedly managing zombie information. The virtual server includes an authentication processing module authenticating a host using a CAPTCHA test and providing a cookie to the authenticated host when a web server access request message received from the host does not include a cookie, a cookie value verification module for extracting a cookie value from the web server access request message and verifying the extracted cookie value when the web server access request message includes a cookie, a web page access inducement module for inducing the host to access a web server when the cookie value is verified, and a zombie identification module for blocking access of the host when the cookie value is not verified, and identifying the host as a zombie when the number of blocking operations exceeds a threshold value.
    Type: Application
    Filed: January 6, 2011
    Publication date: November 3, 2011
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Sang Kyun Noh, Young Tae Yun, Dong Soo Kim, Yo Sik Kim, Yoon Jung Chung, Won Ho Kim, Yu Jung Han, Cheol Won Lee
  • Publication number: 20110271342
    Abstract: A defense method and device against intelligent bots using masqueraded virtual machine information are provided. The method includes performing global hooking on a virtual machine detection request transmitted by a process, determining, on the basis of pre-stored malicious process information, whether or not, the process transmitting the virtual machine detection request corresponds to a malicious process, and when the process is found to correspond to the malicious process as a result of the determination, determining that the process is generated by the intelligent bot, and returning the masqueraded virtual machine information to the process.
    Type: Application
    Filed: September 10, 2010
    Publication date: November 3, 2011
    Applicant: ELECTRONICS AND TELECOMMUNICATIONS RESEARCH INSTITUTE
    Inventors: Yoon Jung CHUNG, Yo Sik KIM, Won Ho KIM, Dong Soo KIM, Sang Kyun NOH, Young Tae YUN, Cheol Won LEE
  • Publication number: 20090157620
    Abstract: Provided is a system and method for searching for a document based on a policy. The system includes: a document database for storing document files; a document format and text filer for extracting document format information and text information from a document newly stored in the document database; a document format policy module for setting a document format search policy according to an instruction from an administrator; a document text policy module for setting a document text search policy according to an instruction from the administrator; a document format information search module for searching for a document having a document format matching the set document format search policy in the document database; and a document text information search module for searching for a document having a text matching the set document text search policy in the document database.
    Type: Application
    Filed: April 15, 2008
    Publication date: June 18, 2009
    Inventors: Eun Young KIM, Young Tae YUN, Eung Ki PARK
  • Publication number: 20090150997
    Abstract: Provided is an apparatus and method for detecting a malicious file that attempts to initiate communication in a mobile terminal without a user's approval. The method of detecting a malicious file in a mobile terminal includes: determining whether a file to be examined is an executable file; when the file is an executable file, examining whether the file is a malicious file that can cause unapproved communication based on at least one predetermined examination condition; and outputting the result of examining whether the file is the malicious file. Accordingly, an attack caused by a new type of malicious code can be coped with.
    Type: Application
    Filed: June 19, 2008
    Publication date: June 11, 2009
    Inventors: Jae Woo PARK, Dong Su NAM, Yun Ju KIM, Young Tae YUN
  • Publication number: 20090138969
    Abstract: A device and method for blocking autorun of a malicious code through an autorun file stored in a removable storage device are provided. A device manager monitors a connection of a removable storage device, acquires a global unique identifier of the removable storage device, and deletes an autorun file for running the malicious code from the removable storage. A registry manager determines whether a registry key for storing content of the autorun file is generated using the global unique identifier of the removable storage device and deletes the registry key. The present invention can block autorun of a malicious code stored in the removable storage device by retrieving and deleting a registry key for performing the autorun technique when a removable storage device is connected to a system.
    Type: Application
    Filed: September 12, 2008
    Publication date: May 28, 2009
    Inventors: Yun Ju Kim, Young Tae Yun
  • Publication number: 20090133126
    Abstract: Provided are an apparatus and method for detecting a Dynamic Link Library (DLL) inserted by a malicious code. The method includes collecting first DLL information from an image file of a process before the process is executed; collecting second DLL information loaded into a memory as the process is executed; comparing the first DLL information with the second DLL information to extract information on an explicit DLL; and determining whether the explicit DLL is a DLL inserted by a malicious code or not.
    Type: Application
    Filed: October 31, 2008
    Publication date: May 21, 2009
    Inventors: Moon Su JANG, Hong Chul KIM, Young Tae YUN
  • Publication number: 20090119647
    Abstract: Provided is a device and method for inspecting software for vulnerabilities which fuzzes the software by function. The device for inspecting software for vulnerabilities includes a target function selecting module for selecting a function of the software for vulnerabilities to be inspected, a comparison file generating module for generating a first file including the selected function and a second file not including the selected function, a binary pattern comparing module for detecting a changed or added binary pattern by comparing binary values of the first file and the second file, a test case generating module for generating at least one test case based on the detected binary pattern, and a vulnerability verifying module for inspecting vulnerabilities based on the at least one test case and generating a vulnerability inspection result.
    Type: Application
    Filed: April 14, 2008
    Publication date: May 7, 2009
    Inventors: Eun Young KIM, Young Tae YUN, Eung Ki PARK
  • Publication number: 20090070876
    Abstract: Provided are an apparatus and method for detecting a malicious process. The apparatus includes: a process monitoring unit for monitoring a process generated in a computing environment; a target process setting unit for previously setting a test target process among the processes confirmed by the process monitoring unit; a process generation time change monitoring unit for monitoring if the target process set by the target process setting unit requests to change a generation time; a generation time change preventing unit for preventing a change in the generation time of the target process when the target process requests to change the generation time; and a malicious process detecting unit for determining that a child process of the target process set by the target process setting unit is a malicious process if the child process is generated within a predetermined reference time.
    Type: Application
    Filed: April 16, 2008
    Publication date: March 12, 2009
    Inventors: Yun Ju KIM, Young Tae YUN
  • Publication number: 20080294725
    Abstract: Provided are a method and system for supporting a simulated-exercise in a cyber space using a message. The system for supporting a simulated-exercise using a massage includes a simulated-exercise manager system for training trainees in a remote location connected through a network by transmitting a situation message for informing critical situations to the trainees and an automatic response message.
    Type: Application
    Filed: December 13, 2007
    Publication date: November 27, 2008
    Inventors: Eun Young KIM, Byung-Chul BAE, Young-Tae YUN, Eung-Ki PARK
  • Publication number: 20080127038
    Abstract: Provided are an apparatus and a method for detecting a self-executable compressed file by analyzing an executable program. The present invention firstly performs a static analysis on an executable file to search an executable file format, examines a section name part to determine whether the executable file format can be executable or not in compliance with a PE format standard based on a general PE file structure, and determines the executable file as a suspicious file if there is an abnormal section name or structure. Secondly, instructions are examined through disassembling in a section range where a corresponding executable file entry point exists if the suspicious part is found in the first analysis, and it is determined that the file is finally self-executable compressed if there is a file jumping from an address space of a section range where the entry point exists and jumping into a memory region of another section having read/write/execute characteristics.
    Type: Application
    Filed: September 25, 2007
    Publication date: May 29, 2008
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Jae Woo Park, Young Tae Yun