Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where YoungHan Choi is active.

Publication


Featured researches published by YoungHan Choi.


international conference on future generation information technology | 2009

Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis

YoungHan Choi; TaeGhyoon Kim; Seokjin Choi; Cheolwon Lee

Recently, most of malicious web pages include obfuscated codes in order to circumvent the detection of signature-based detection systems. It is difficult to decide whether the sting is obfuscated because the shape of obfuscated strings are changed continuously. In this paper, we propose a novel methodology that can detect obfuscated strings in the malicious web pages. We extracted three metrics as rules for detecting obfuscated strings by analyzing patterns of normal and malicious JavaScript codes. They are N-gram , Entropy , and Word Size . N-gram checks how many each byte code is used in strings. Entropy checks distributed of used byte codes. Word size checks whether there is used very long string. Based on the metrics, we implemented a practical tool for our methodology and evaluated it using read malicious web pages. The experiment results showed that our methodology can detect obfuscated strings in web pages effectively.


international conference on advanced communication technology | 2008

Practical Security Testing using File Fuzzing

Hyoung-Chun Kim; YoungHan Choi; DoHoon Lee; Dong Hoon Lee

File Fuzzing is the method that inserts fault into general file and monitors the errors during executing the software with fault-inserted file. In this paper, we propose the practical methodology for security testing of software using two file fuzzing approaches. The methodology focuses on binary fields and TAGs(in markup language) of the file. And we show the practical applying to WMF and HTML file.


information security and cryptology | 2013

Generating Malware DNA to Classify the Similar Malwares

Byoung-Jin Han; YoungHan Choi; Byung-Chul Bae

According to the national information security white paper 2013, the number of hacking attempt in 2012 is 17,570 which is increased by 67.4% than in 2011, and it has been increasing year after year. The cause of this increase is considered as pursuit of monetary profit and diversification techniques of infection. However, because the development of malicious code faster than the increase in the number of experts to analyze and respond the malware, it is difficult to respond to security threats due to malicious code. So, the interest on automatic analysis tools is increasing. In this paper, we proposed the method of malware classification by similarity using malware DNA. It helps the experts to reduce the analysis time, to increase the correctness. The proposed method generates `Malware DNA` from extracted features, and then calculates similarity to classify the malwares.


international conference on advanced communication technology | 2008

An Empirical Study for Security of Windows DLL Files Using Automated API Fuzz Testing

YoungHan Choi; Hyoung-Chun Kim; DoHoon Lee

Fuzz testing is a method that inserts an unexpected data into input of a software system and finds defects of it in order to perform security testing. In this paper , We proposed a novel methodology that performed API fuzz testing automatically and evaluated it for Windows system that most of people in the world used. We implemented an automated API fuzz testing tool that our methodology applied to. Using this tool, we experimented on 1,182 DLL files and 6,117 API functions in a system fold of Windows XP SP2. We found 177 faults in them. Among faults, 10 faults are related to control flow of a program.


international conference on hybrid information technology | 2008

Anatomy of Exploit Code in Non-Executable Files using Virtualization

YoungHan Choi; InSook Jan; HyungGeun Oh; DoHoon Lee

In this paper, we propose a methodology for detecting and analyzing the exploit code in nonexecutable files using virtualization. It is difficult to detect and analyze the exploit code in a non-executable file because the code and real data are mixed in the file. We trace the execution flow of the target software system while parsing the file, and start to analyze the exploit code when the execution flow strays outside of normal modules. The normal module region is the region that the target software system executes normally. By extracting the exploit code from the nonexecutable file, signatures for detecting the nonexecutable material, including the exploit code, can begenerated.


international conference on hybrid information technology | 2008

API Fuzz Testing for Security of Libraries in Windows Systems: From Faults To Vulnerabilites

DoHoon Lee; YoungHan Choi; Jae-Cheol Ryou

Application programming interface (API) fuzz testing is used to insert unexpected data into the parameters of functions and to monitor for resulting program errors or exceptions in order to test the security of APIs. However, vulnerabilities through which a user cannot insert data into API parameters are not security threats, because attackers cannot exploit such vulnerabilities. In this paper, we propose a methodology that can automatically find paths between inputs of programs and faulty APIs. Where such paths exist, faults in APIs represent security threats. We call our methodology Automated Windows API Fuzz Testing II (AWAFTII). This method extends our previous research for performing API fuzz testing into the AWAFTII process. The AWAFTII process consists of finding faults using API fuzz testing, analyzing those faults, and searching for input data related to parameters of APIs with faults. We implemented a practical tool for AWAFTII and applied it to programs in the system folder of Windows XP SP2. Experimental results show that AWAFTII can detect paths between input of programs and APIs with faults.


Archive | 2012

TWO-STAGE INTRUSION DETECTION SYSTEM FOR HIGH-SPEED PACKET PROCESSING USING NETWORK PROCESSOR AND METHOD THEREOF

YoungHan Choi; Deokjin Kim; Sungryoul Lee; Man-hee Lee; Byung-Chul Bae; Sang-Woo Park; E-Joong Yoon


international conference on convergence information technology | 2007

Tag-Aware Text File Fuzz Testing for Security of a Software System

YoungHan Choi; Hyoung-Chun Kim; DoHoon Lee


IEICE Transactions on Communications | 2012

Detecting Heap-Spraying Code Injection Attacks in Malicious Web Pages Using Runtime Execution

YoungHan Choi; Hyoung-Chun Kim; Dong Hoon Lee


international conference on computational science and its applications | 2008

Call-Flow Aware API Fuzz Testing for Security of Windows Systems

YoungHan Choi; Hyoung-Chun Kim; HyungGeun Oh; DoHoon Lee

Collaboration


Dive into the YoungHan Choi's collaboration.

Top Co-Authors

Avatar

DoHoon Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Hyoung-Chun Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

HyungGeun Oh

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Byung-Chul Bae

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sungryoul Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Byoung-Jin Han

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Cheolwon Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Deokjin Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

E-Joong Yoon

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge