Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Young Han Choi is active.

Publication


Featured researches published by Young Han Choi.


Journal of Systems Architecture | 2011

Efficient file fuzz testing using automated analysis of binary file format

Hyoung Chun Kim; Young Han Choi; Dong Hoon Lee

Fuzz testing is regarded as the most useful technique in finding serious security holes in a software system. It inserts unexpected data into the input of the software system and finds the systems bugs or errors. However, one of the disadvantages that fuzz testing executed using binary files has is that it requires a large number of fault-inserted files to cover every test case, which could be up to 2^8^x^F^I^L^E^S^I^Z^E files. In order to overcome this drawback, we propose a novel algorithm that efficiently reduces the number of fault-inserted files, yet still maintain the maximum test case coverage. The proposed approach enables the automatic analysis of fields of binary files by tracking and analyzing stack frames, assembly codes, and registers as the software system parses the files. We evaluate the efficacy of the new method by implementing a practical tool, the Binary File Analyzer and Fault Injector (BFAFI), which traces the program execution and analyzes the fields in binary file format. Our experiments demonstrate that the BFAFI reduced the total number of fault-inserted files with maximum test case coverage as well as detected approximately 14 times more exceptions than did the general fuzzer. Also, the BFAFI found 11 causes of exceptions; five of them were found only by BFAFI. Ten of the 11 causes of exceptions that we found were generated by a graphic rendering engine (GDI32.dll); the other was generated by the system library (kernel32.dll) in Windows XP SP2.


Ksii Transactions on Internet and Information Systems | 2012

JsSandbox: A Framework for Analyzing the Behavior of Malicious JavaScript Code using Internal Function Hooking

Hyoung Chun Kim; Young Han Choi; Dong Hoon Lee

Recently, many malicious users have attacked web browsers using JavaScript code that can execute dynamic actions within the browsers. By forcing the browser to execute malicious JavaScript code, the attackers can steal personal information stored in the system, allow malware program downloads in the client’s system, and so on. In order to reduce damage, malicious web pages must be located prior to general users accessing the infected pages. In this paper, a novel framework (JsSandbox) that can monitor and analyze the behavior of malicious JavaScript code using internal function hooking (IFH) is proposed. IFH is defined as the hooking of all functions in the modules using the debug information and extracting the parameter values. The use of IFH enables the monitoring of functions that API hooking cannot. JsSandbox was implemented based on a debugger engine, and some features were applied to detect and analyze malicious JavaScript code: detection of obfuscation, deobfuscation of the obfuscated string, detection of URLs related to redirection, and detection of exploit codes. Then, the proposed framework was analyzed for specific features, and the results demonstrate that JsSandbox can be applied to the analysis of the behavior of malicious web pages.


Archive | 2010

System and method for detecting malicious script

Tae Ghyoon Kim; Young Han Choi; Seok Jin Choi; Cheol Won Lee


Archive | 2009

APPARATUS AND METHOD FOR DETECTING OBFUSCATED MALICIOUS WEB PAGE

Jung Min Kang; Young Han Choi; Do Hoon Lee; Eung Ki Park


Archive | 2008

Method and apparatus for analyzing exploit code in nonexecutable file using virtual environment

Young Han Choi; Hyoung Chun Kim; Do Hoon Lee


Computing and Networking Technology (ICCNT), 2012 8th International Conference on | 2013

Toward extracting malware features for classification using static and dynamic analysis

Young Han Choi; Byoung Jin Han; Byung Chul Bae; Hyung Geun Oh; Ki Wook Sohn


Archive | 2008

Method and apparatus for extracting text from internet mail attachment file

Young Han Choi; In Sook Jang; Hyung Geun Oh; Do Hoon Lee


IEICE Transactions on Communications | 2015

STROP: Static Approach for Detection of Return-Oriented Programming Attack in Network

Young Han Choi; Dong Hoon Lee


Archive | 2013

Intrusion detection apparatus and method using load balancer responsive to traffic conditions between central processing unit and graphics processing unit

Junghee Lee; Sungryoul Lee; Deokjin Kim; Young Han Choi; Byung-Chul Bae; HyungGeun Oh; Kiwook Sohn; Kyoungsoo Park; Yung Yi; Jihyung Lee; Sangwoo Moon


Archive | 2008

System and method for managing network by value-based estimation

Young Han Choi; Hyoung Chun Kim; Tae Ghyoon Kim; Do Hoon Lee; Eungki Park

Collaboration


Dive into the Young Han Choi's collaboration.

Top Co-Authors

Avatar

Hyoung Chun Kim

Kangwon National University

View shared research outputs
Top Co-Authors

Avatar

Do Hoon Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Hyung Geun Oh

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Tae Ghyoon Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Deokjin Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

HyungGeun Oh

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Kiwook Sohn

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Byoung Jin Han

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Byung Chul Bae

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge