Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where TaeGuen Kim is active.

Publication


Featured researches published by TaeGuen Kim.


research in applied computation symposium | 2011

Fast malware family detection method using control flow graphs

BooJoong Kang; Hye Seon Kim; TaeGuen Kim; Heejun Kwon; Eul Gyu Im

As attackers make variants of existing malware, it is possible to detect unknown malware by comparing with already-known malwares information. Control flow graphs have been used in dynamic analysis of program source code. In this paper, we proposed a new method which can analyze and detect malware binaries using control flow graphs and Bloom filter by abstracting common characteristics of malware families. The experimental results showed that processing overhead of our proposed method is much lower than n-gram based methods.


research in adaptive and convergent systems | 2014

Similarity calculation method for user-define functions to detect malware variants

TaeGuen Kim; Jung Bin Park; In Gyeom Cho; BooJoong Kang; Eul Gyu Im; Sooyong Kang

The number of malware has sharply increased over years, and it caused various damages on computing systems and data. In this paper, we propose techniques to detect malware variants. Malware authors usually reuse malware modules when they generate new malware or malware variants. Therefore, malware variants have common code for some functions in their binary files. We focused on this common code in this research, and proposed the techniques to detect malware variants through similarity calculation of user-defined function. Since many malware variants evade malware detection system by transforming their static signatures, to cope with this problem, we applied pattern matching algorithms for DNA variations in Bioinformatics to similarity calculation of malware binary files. Since the pattern matching algorithm we used provides the local alignment function, small modification of functions can be overcome. Experimental results show that our proposed method can detect malware similarity and it is more resilient than other methods.


research in adaptive and convergent systems | 2014

TASEL: dynamic taint analysis with selective control dependency

Byeongho Kang; TaeGuen Kim; BooJoong Kang; Eul Gyu Im; Minsoo Ryu

Dynamic Taint Analysis (DTA) is an approach used for software testing and vulnerability analysis. The vanilla DTA method is widely used, but its simple taint propagation does not consider any control dependency. Therefore, vanilla DTA generally suffers from the under-tainting caused by control dependency. The under-tainting can be problematic when analyzers try to check vulnerabilities of software. In this paper, we propose Dynamic Taint Analysis with Selective Control Dependency (TASEL), to mitigate the under-tainting problem caused by control dependency. Our technique detects control-dependent data which have possibilities to change the programs control flows. We implemented TASEL using Intel Pin, and applied it for the commodity programs such as Microsoft Notepad. Experimental results show our proposed method successfully resolves the under-tainting problem, without causing the over-tainting problem.


ieee international conference on network infrastructure and digital content | 2014

Survey of dynamic taint analysis

Junhyoung Kim; TaeGuen Kim; Eul Gyu Im

Dynamic taint analysis (DTA) is to analyze execution paths that an attacker may use to exploit a system. Dynamic taint analysis is a method to analyze executable files by tracing information flow without source code. DTA marks certain inputs to program as tainted, and then propagates values operated with tainted inputs. Due to the increased popularity of dynamic taint analysis, there have been a few recent research approaches to provide a generalized tainting infrastructure. In this paper, we introduce some approaches of dynamic taint analysis, and analyze their approaches. Lam and Chiuehs approach proposed a method that instruments code to perform taint marking and propagation. DYTAN considers three dimensions: taint source, propagation policies, taint sink. These dimensions make DYTAN to be more general framework for dynamic taint analysis. DTA++ proposes an idea to vanilla dynamic taint analysis that propagates additional taints along with targeted control dependencies. Control dependency causes results of taint analysis to have decreased accuracies. To improve accuracies, DTA++ showed that data transformation containing implicit flows should propagate properly to avoid under-tainting.


research in adaptive and convergent systems | 2018

Malware classification using byte sequence information

Byungho Jung; TaeGuen Kim; Eul Gyu Im

The number of new malware and new malware variants have been increasing continuously. Security experts analyze malware to capture the malicious properties of malware and to generate signatures or detection rules, but the analysis overheads keep increasing with the increasing number of malware. To analyze a large amount of malware, various kinds of automatic analysis methods are in need. Recently, deep learning techniques such as convolutional neural network (CNN) and recurrent neural network (RNN) have been applied for malware classifications. The features used in the previous approches are mostly based on API (Application Programming Interface) information, and the API invocation information can be obtained through dynamic analysis. However, the invocation information may not reflect malicious behaviors of malware because malware developers use various analysis avoidance techniques. Therefore, deep learning-based malware analysis using other features still need to be developed to improve malware analysis performance. In this paper, we propose a malware classification method using the deep learning algorithm based on byte information. Our proposed method uses images generated from malware byte information that can reflect malware behavioral context, and the convolutional neural network-based sentence analysis is used to process the generated images. We performed several experiments to show the effecitveness of our proposed method, and the experimental results show that our method showed higher accuracy than the naive CNN model, and the detection accuracy was about 99%.


Mobile Information Systems | 2018

Runtime Detection Framework for Android Malware

TaeGuen Kim; BooJoong Kang; Eul Gyu Im

As the number of Android malware has been increased rapidly over the years, various malware detection methods have been proposed so far. Existing methods can be classified into two categories: static analysis-based methods and dynamic analysis-based methods. Both approaches have some limitations: static analysis-based methods are relatively easy to be avoided through transformation techniques such as junk instruction insertions, code reordering, and so on. However, dynamic analysis-based methods also have some limitations that analysis overheads are relatively high and kernel modification might be required to extract dynamic features. In this paper, we propose a dynamic analysis framework for Android malware detection that overcomes the aforementioned shortcomings. The framework uses a suffix tree that contains API (Application Programming Interface) subtraces and their probabilistic confidence values that are generated using HMMs (Hidden Markov Model) to reduce the malware detection overhead, and we designed the framework with the client-server architecture since the suffix tree is infeasible to be deployed in mobile devices. In addition, an application rewriting technique is used to trace API invocations without any modifications in the Android kernel. In our experiments, we measured the detection accuracy and the computational overheads to evaluate its effectiveness and efficiency of the proposed framework.


research in adaptive and convergent systems | 2016

Touch Gesture Data based Authentication Method for Smartphone Users

JunGyu Park; TaeGuen Kim; Eul Gyu Im

Among all the security technologies of smartphones, biometrics authentication technologies are on the rise to provide higher reliability and security. However, existing biometric authentication methods, such as fingerprints and voice recognition have some drawbacks. For example, many biometric authentication methods require special devices to collect biometric features. This paper proposes an authentication method based on inputs from the touchscreen of a smartphone. Our proposed authentication system uses 48 features from the touch gestures to authenticate the owner of a smartphone. We tested our proposed system and its EER was about 0.7%, and we claim that our system can be effective to authenticate smartphone owners.


ieee international conference on network infrastructure and digital content | 2016

Mobile-based continuous user authentication system for cloud security

Qing Li; Le Wang; TaeGuen Kim; Eul Gyu Im

Recently, Cloud based services have become very popular, and many people are willing to use cloud services because of their convenience. For instance, people would like to store their files in the cloud storage, and the files may contain important data or private information. If important files are accessed by unauthorized users due to unsecure cloud services, it may cause financial losses and people may be unwilling to use cloud services. Consequently, how to increase security of cloud services is quite important for the services to be successful and used widely. In addition, mobile devices have become more and more popular, and one of the main accessing devices to cloud services is mobile devices. In this paper, we propose a mobile-based continuous user authentication system to protect cloud service users.


The Journal of Supercomputing | 2016

Binary executable file similarity calculation using function matching

TaeGuen Kim; Yeo Reum Lee; BooJoong Kang; Eul Gyu Im

Nowadays, computer software is an essential part in our lives and is used in various fields. While software gives us convenience, it also causes many problems. Various research efforts are needed to defend against software plagiarism, attacks using malware/software, and so on. Analysis techniques of binary executable files can be applied to investigate and defend these problems. However, it is relatively hard to analyze binary executable files without source code information, because executable files only have the information for execution and discard semantic information during the compiling process. In this paper, we proposed a similarity calculation method for binary executable files, based on function matching techniques. Attributes of a function are extracted and these attributes are used to match functions of two binary files. Our function matching process is composed of three steps: the function name matching step, the N-tuple matching step, and the final n-gram-based matching step. After the function matching process is performed, the overall similarity is calculated based on similarities of matched functions. Experimental results show that similarity accuracy of our binary-based similarity calculation method is similar to those of a well-known source-code-based method, call MOSS.


rough sets and knowledge technology | 2015

A Study on Similarity Calculation Method for API Invocation Sequences

Yu Jin Shim; TaeGuen Kim; Eul Gyu Im

Malware variants have been developed and spread in the Internet, and the number of new malware variants is increases every year. Recently, malware is applied with obfuscation and mutation techniques to hide its existence, and malware variants are developed with various automatic tools that transform the properties of existing malware to avoid static analysis based malware detection systems. It is difficult to detect such obfuscated malware with static-based signatures, so we have designed a detection system based on dynamic analysis. In this paper, we propose a dynamic analysis based system that uses the API invocation sequences to compare behaviors of suspicious software with behaviors of existing malware.

Collaboration


Dive into the TaeGuen Kim's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

BooJoong Kang

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

BooJoong Kang

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge