Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kyoung-Soo Han is active.

Publication


Featured researches published by Kyoung-Soo Han.


International Journal of Information Security | 2015

Malware analysis using visualized images and entropy graphs

Kyoung-Soo Han; Jae Hyun Lim; BooJoong Kang; Eul Gyu Im

Today, along with the development of the Internet, the number of malicious software, or malware, distributed especially for monetary profits, is exponentially increasing, and malware authors are developing malware variants using various automated tools and methods. Automated tools and methods may reuse some modules to develop malware variants, so these reused modules can be used to classify malware or to identify malware families. Therefore, similarities may exist among malware variants can be analyzed and used for malware variant detections and the family classification. This paper proposes a new malware family classification method by converting binary files into images and entropy graphs. The experimental results show that the proposed method can effectively distinguish malware families.


research in adaptive and convergent systems | 2013

Malware analysis method using visualization of binary files

Kyoung-Soo Han; Jae Hyun Lim; Eul Gyu Im

Malware authors have been generating and disseminating malware variants through various ways, such as reusing modules or using automated malware generation tools. With the help of the malware generation techniques, the number of malware keeps increasing every year. Therefore, new malware analysis techniques are needed to reduce malware analysis overheads. Recently several malware visualization methods were proposed to help malware analysts. In this paper, we proposed a novel method to visually analyze malware by transforming malware binary information into image matrices. Our experimental results show that the image matrices of malware can effectively classify malware families.


Digital Investigation | 2014

Malware categorization using dynamic mnemonic frequency analysis with redundancy filtering

BooJoong Kang; Kyoung-Soo Han; Byeongho Kang; Eul Gyu Im

The battle between malware developers and security analysts continues, and the number of malware and malware variants keeps increasing every year. Automated malware generation tools and various detection evasion techniques are also developed every year. To catch up with the advance of malware development technologies, malware analysis techniques need to be advanced to help security analysts. In this paper, we propose a malware analysis method to categorize malware using dynamic mnemonic frequencies. We also proposed a redundancy filtering technique to alleviate drawbacks of dynamic analysis. Experimental results show that our proposed method can categorize malware and can reduce storage overheads of dynamic analysis.


international conference on it convergence and security, icitcs | 2012

Malware Classification Methods Using API Sequence Characteristics

Kyoung-Soo Han; In-Kyoung Kim; Eul Gyu Im

Malware is generated to gain profits by attackers, and it infects many users’ computers. As a result, attackers can acquire private information such as login IDs, passwords, e-mail addresses, cell-phone numbers and banking account numbers from infected machines. Moreover, infected machines can be used for other cyber-attacks such as DDoS attacks, spam e-mail transmissions, and so on. The number of new malware discovered every day is increasing continuously because the automated tools allow attackers to generate the new malware or their variants easily. Therefore, a rapid malware analysis method is required in order to mitigate the infection rate and secondary damage to users. In this paper, we proposed a malware variant classification method using sequential characteristics of API used, and described experiment results with some malware samples.


research in applied computation symposium | 2011

Malware classification using instruction frequencies

Kyoung-Soo Han; BooJoong Kang; Eul Gyu Im

Developing variants of malware is a common and effective method to avoid the signature detection of antivirus programs. Malware analysis and signature abstraction are essential technologies to update the detection signature DB for malware detection. Since most malware binary analysis processes are performed manually, malware binary analysis is a time-consuming job. Therefore, efficient malware classification can be used to speed up malware binary analysis. As malware variants of the same malware family may share a portion of their binary code, the sequences of instructions may be similar, or even identical. In this paper, we propose a malware classification method that uses instruction frequencies. Our test results show that there are clear distinctions among malware and normal programs.


The Scientific World Journal | 2014

Malware analysis using visualized image matrices.

Kyoung-Soo Han; BooJoong Kang; Eul Gyu Im

This paper proposes a novel malware visual analysis method that contains not only a visualization method to convert binary files into images, but also a similarity calculation method between these images. The proposed method generates RGB-colored pixels on image matrices using the opcode sequences extracted from malware samples and calculates the similarities for the image matrices. Particularly, our proposed methods are available for packed malware samples by applying them to the execution traces extracted through dynamic analysis. When the images are generated, we can reduce the overheads by extracting the opcode sequences only from the blocks that include the instructions related to staple behaviors such as functions and application programming interface (API) calls. In addition, we propose a technique that generates a representative image for each malware family in order to reduce the number of comparisons for the classification of unknown samples and the colored pixel information in the image matrices is used to calculate the similarities between the images. Our experimental results show that the image matrices of malware can effectively be used to classify malware families both statically and dynamically with accuracy of 0.9896 and 0.9732, respectively.


international conference on it convergence and security, icitcs | 2012

Detection Methods for Malware Variant Using API Call Related Graphs

Kyoung-Soo Han; In-Kyoung Kim; Eul Gyu Im

Recently damages in users caused by malware have been increased. The malware presently propagated has been generated as variants by modifying it using various techniques and tools and that leads to significant increase in the number of malware. Thus, researches on various methods for detecting such malware have been conducted. In this paper, we proposed a method to detect malware variants through the measuring of similarity in control flow graphs related to API calls in malware.


International Journal of E-entrepreneurship and Innovation | 2013

Android Permission System Violation: Case Study and Refinement

Kyoung-Soo Han; Yeoreum Lee; Biao Jiang; Eul Gyu Im

Android uses permissions for application security management. Android also allows inter-application communication (IAC), which enables cooperation between different applications to perform complex tasks by using some components and Intents. In other words, Android provides more flexibility and places less restriction on application development. This is a major feature that differentiates Android from its competitors. However, IAC also facilitates malicious applications that can collude in attacks of privilege escalation. In this paper, the authors demonstrate with case studies that all IAC channels can potentially be utilized for privilege escalation attacks, and the authors propose a refinement to solve this problem by enforcing IAC permissions and exposing IAC to users. Android Permission System Violation: Case Study and Refinement


international conference on it convergence and security, icitcs | 2012

A Survey on P2P Botnet Detection

Kyoung-Soo Han; Eul Gyu Im

Recently cyber-attacks in Internet using botnets have been increased. Also, crimes involved in monetary profits through cyber-attacks have been continuously increased. Attackers can use P2P botnets to launch various attacks such as Distributed Denial of Service (DDoS), malware propagation, and so on. For this reason, P2P botnet detection techniques have been studied. This paper is a survey of P2P botnet detection, and describes about the general type of P2P botnets and detection methods.


international conference on it convergence and security, icitcs | 2012

An Analysis of Malware Attached in Spam

Eul Gyu Im; Kyoung-Soo Han

Spam is usually used to propagate malware. Most spam leads to click the links or attached files by disguising it with social issues, entertainers, events, Christmas or New Year greetings, and friends using social engineering techniques. As a user clicks it, the user’s system is infected with malware. The infected systems can be used to various cyber-crimes. Recently such spam has been increased and that includes executable malware. In this paper, the results of the analysis of the malware attached in spam are presented.

Collaboration


Dive into the Kyoung-Soo Han's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge