Kyoung-Soo Han
Hanyang University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kyoung-Soo Han.
International Journal of Information Security | 2015
Kyoung-Soo Han; Jae Hyun Lim; BooJoong Kang; Eul Gyu Im
Today, along with the development of the Internet, the number of malicious software, or malware, distributed especially for monetary profits, is exponentially increasing, and malware authors are developing malware variants using various automated tools and methods. Automated tools and methods may reuse some modules to develop malware variants, so these reused modules can be used to classify malware or to identify malware families. Therefore, similarities may exist among malware variants can be analyzed and used for malware variant detections and the family classification. This paper proposes a new malware family classification method by converting binary files into images and entropy graphs. The experimental results show that the proposed method can effectively distinguish malware families.
research in adaptive and convergent systems | 2013
Kyoung-Soo Han; Jae Hyun Lim; Eul Gyu Im
Malware authors have been generating and disseminating malware variants through various ways, such as reusing modules or using automated malware generation tools. With the help of the malware generation techniques, the number of malware keeps increasing every year. Therefore, new malware analysis techniques are needed to reduce malware analysis overheads. Recently several malware visualization methods were proposed to help malware analysts. In this paper, we proposed a novel method to visually analyze malware by transforming malware binary information into image matrices. Our experimental results show that the image matrices of malware can effectively classify malware families.
Digital Investigation | 2014
BooJoong Kang; Kyoung-Soo Han; Byeongho Kang; Eul Gyu Im
The battle between malware developers and security analysts continues, and the number of malware and malware variants keeps increasing every year. Automated malware generation tools and various detection evasion techniques are also developed every year. To catch up with the advance of malware development technologies, malware analysis techniques need to be advanced to help security analysts. In this paper, we propose a malware analysis method to categorize malware using dynamic mnemonic frequencies. We also proposed a redundancy filtering technique to alleviate drawbacks of dynamic analysis. Experimental results show that our proposed method can categorize malware and can reduce storage overheads of dynamic analysis.
international conference on it convergence and security, icitcs | 2012
Kyoung-Soo Han; In-Kyoung Kim; Eul Gyu Im
Malware is generated to gain profits by attackers, and it infects many users’ computers. As a result, attackers can acquire private information such as login IDs, passwords, e-mail addresses, cell-phone numbers and banking account numbers from infected machines. Moreover, infected machines can be used for other cyber-attacks such as DDoS attacks, spam e-mail transmissions, and so on. The number of new malware discovered every day is increasing continuously because the automated tools allow attackers to generate the new malware or their variants easily. Therefore, a rapid malware analysis method is required in order to mitigate the infection rate and secondary damage to users. In this paper, we proposed a malware variant classification method using sequential characteristics of API used, and described experiment results with some malware samples.
research in applied computation symposium | 2011
Kyoung-Soo Han; BooJoong Kang; Eul Gyu Im
Developing variants of malware is a common and effective method to avoid the signature detection of antivirus programs. Malware analysis and signature abstraction are essential technologies to update the detection signature DB for malware detection. Since most malware binary analysis processes are performed manually, malware binary analysis is a time-consuming job. Therefore, efficient malware classification can be used to speed up malware binary analysis. As malware variants of the same malware family may share a portion of their binary code, the sequences of instructions may be similar, or even identical. In this paper, we propose a malware classification method that uses instruction frequencies. Our test results show that there are clear distinctions among malware and normal programs.
The Scientific World Journal | 2014
Kyoung-Soo Han; BooJoong Kang; Eul Gyu Im
This paper proposes a novel malware visual analysis method that contains not only a visualization method to convert binary files into images, but also a similarity calculation method between these images. The proposed method generates RGB-colored pixels on image matrices using the opcode sequences extracted from malware samples and calculates the similarities for the image matrices. Particularly, our proposed methods are available for packed malware samples by applying them to the execution traces extracted through dynamic analysis. When the images are generated, we can reduce the overheads by extracting the opcode sequences only from the blocks that include the instructions related to staple behaviors such as functions and application programming interface (API) calls. In addition, we propose a technique that generates a representative image for each malware family in order to reduce the number of comparisons for the classification of unknown samples and the colored pixel information in the image matrices is used to calculate the similarities between the images. Our experimental results show that the image matrices of malware can effectively be used to classify malware families both statically and dynamically with accuracy of 0.9896 and 0.9732, respectively.
international conference on it convergence and security, icitcs | 2012
Kyoung-Soo Han; In-Kyoung Kim; Eul Gyu Im
Recently damages in users caused by malware have been increased. The malware presently propagated has been generated as variants by modifying it using various techniques and tools and that leads to significant increase in the number of malware. Thus, researches on various methods for detecting such malware have been conducted. In this paper, we proposed a method to detect malware variants through the measuring of similarity in control flow graphs related to API calls in malware.
International Journal of E-entrepreneurship and Innovation | 2013
Kyoung-Soo Han; Yeoreum Lee; Biao Jiang; Eul Gyu Im
Android uses permissions for application security management. Android also allows inter-application communication (IAC), which enables cooperation between different applications to perform complex tasks by using some components and Intents. In other words, Android provides more flexibility and places less restriction on application development. This is a major feature that differentiates Android from its competitors. However, IAC also facilitates malicious applications that can collude in attacks of privilege escalation. In this paper, the authors demonstrate with case studies that all IAC channels can potentially be utilized for privilege escalation attacks, and the authors propose a refinement to solve this problem by enforcing IAC permissions and exposing IAC to users. Android Permission System Violation: Case Study and Refinement
international conference on it convergence and security, icitcs | 2012
Kyoung-Soo Han; Eul Gyu Im
Recently cyber-attacks in Internet using botnets have been increased. Also, crimes involved in monetary profits through cyber-attacks have been continuously increased. Attackers can use P2P botnets to launch various attacks such as Distributed Denial of Service (DDoS), malware propagation, and so on. For this reason, P2P botnet detection techniques have been studied. This paper is a survey of P2P botnet detection, and describes about the general type of P2P botnets and detection methods.
international conference on it convergence and security, icitcs | 2012
Eul Gyu Im; Kyoung-Soo Han
Spam is usually used to propagate malware. Most spam leads to click the links or attached files by disguising it with social issues, entertainers, events, Christmas or New Year greetings, and friends using social engineering techniques. As a user clicks it, the user’s system is infected with malware. The infected systems can be used to various cyber-crimes. Recently such spam has been increased and that includes executable malware. In this paper, the results of the analysis of the malware attached in spam are presented.