Young Han Choi
Electronics and Telecommunications Research Institute
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Young Han Choi.
Journal of Systems Architecture | 2011
Hyoung Chun Kim; Young Han Choi; Dong Hoon Lee
Fuzz testing is regarded as the most useful technique in finding serious security holes in a software system. It inserts unexpected data into the input of the software system and finds the systems bugs or errors. However, one of the disadvantages that fuzz testing executed using binary files has is that it requires a large number of fault-inserted files to cover every test case, which could be up to 2^8^x^F^I^L^E^S^I^Z^E files. In order to overcome this drawback, we propose a novel algorithm that efficiently reduces the number of fault-inserted files, yet still maintain the maximum test case coverage. The proposed approach enables the automatic analysis of fields of binary files by tracking and analyzing stack frames, assembly codes, and registers as the software system parses the files. We evaluate the efficacy of the new method by implementing a practical tool, the Binary File Analyzer and Fault Injector (BFAFI), which traces the program execution and analyzes the fields in binary file format. Our experiments demonstrate that the BFAFI reduced the total number of fault-inserted files with maximum test case coverage as well as detected approximately 14 times more exceptions than did the general fuzzer. Also, the BFAFI found 11 causes of exceptions; five of them were found only by BFAFI. Ten of the 11 causes of exceptions that we found were generated by a graphic rendering engine (GDI32.dll); the other was generated by the system library (kernel32.dll) in Windows XP SP2.
Ksii Transactions on Internet and Information Systems | 2012
Hyoung Chun Kim; Young Han Choi; Dong Hoon Lee
Recently, many malicious users have attacked web browsers using JavaScript code that can execute dynamic actions within the browsers. By forcing the browser to execute malicious JavaScript code, the attackers can steal personal information stored in the system, allow malware program downloads in the client’s system, and so on. In order to reduce damage, malicious web pages must be located prior to general users accessing the infected pages. In this paper, a novel framework (JsSandbox) that can monitor and analyze the behavior of malicious JavaScript code using internal function hooking (IFH) is proposed. IFH is defined as the hooking of all functions in the modules using the debug information and extracting the parameter values. The use of IFH enables the monitoring of functions that API hooking cannot. JsSandbox was implemented based on a debugger engine, and some features were applied to detect and analyze malicious JavaScript code: detection of obfuscation, deobfuscation of the obfuscated string, detection of URLs related to redirection, and detection of exploit codes. Then, the proposed framework was analyzed for specific features, and the results demonstrate that JsSandbox can be applied to the analysis of the behavior of malicious web pages.
Archive | 2010
Tae Ghyoon Kim; Young Han Choi; Seok Jin Choi; Cheol Won Lee
Archive | 2009
Jung Min Kang; Young Han Choi; Do Hoon Lee; Eung Ki Park
Archive | 2008
Young Han Choi; Hyoung Chun Kim; Do Hoon Lee
Computing and Networking Technology (ICCNT), 2012 8th International Conference on | 2013
Young Han Choi; Byoung Jin Han; Byung Chul Bae; Hyung Geun Oh; Ki Wook Sohn
Archive | 2008
Young Han Choi; In Sook Jang; Hyung Geun Oh; Do Hoon Lee
IEICE Transactions on Communications | 2015
Young Han Choi; Dong Hoon Lee
Archive | 2013
Junghee Lee; Sungryoul Lee; Deokjin Kim; Young Han Choi; Byung-Chul Bae; HyungGeun Oh; Kiwook Sohn; Kyoungsoo Park; Yung Yi; Jihyung Lee; Sangwoo Moon
Archive | 2008
Young Han Choi; Hyoung Chun Kim; Tae Ghyoon Kim; Do Hoon Lee; Eungki Park