[go: up one dir, main page]

WO2018016669A3 - 공격 문자열 생성 방법 및 장치 - Google Patents

공격 문자열 생성 방법 및 장치 Download PDF

Info

Publication number
WO2018016669A3
WO2018016669A3 PCT/KR2016/008263 KR2016008263W WO2018016669A3 WO 2018016669 A3 WO2018016669 A3 WO 2018016669A3 KR 2016008263 W KR2016008263 W KR 2016008263W WO 2018016669 A3 WO2018016669 A3 WO 2018016669A3
Authority
WO
WIPO (PCT)
Prior art keywords
attack string
web application
execution state
analyzing
final attack
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/KR2016/008263
Other languages
English (en)
French (fr)
Other versions
WO2018016669A2 (ko
Inventor
진민식
윤종원
임종환
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fasoo com Co Ltd
Original Assignee
Fasoo com Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fasoo com Co Ltd filed Critical Fasoo com Co Ltd
Priority to US16/318,476 priority Critical patent/US11496502B2/en
Priority to JP2019503340A priority patent/JP6785360B2/ja
Priority to CN201680087790.9A priority patent/CN109565499B/zh
Publication of WO2018016669A2 publication Critical patent/WO2018016669A2/ko
Publication of WO2018016669A3 publication Critical patent/WO2018016669A3/ko
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/168Implementing security features at a particular protocol layer above the transport layer

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computer And Data Communications (AREA)
  • Debugging And Monitoring (AREA)

Abstract

웹 애플리케이션의 실행 상태를 분석하는 동적 분석기의 동작 방법이 개시된다. 상기 웹 애플리케이션을 통해 실행될 특정 동작을 지시하는 파라미터를 포함하는 최종 공격 문자열에 기초한 상기 웹 애플리케이션의 실행 상태를 분석하는 단계; 및 웹 애플리케이션의 실행 상태에 대한 분석하는 단계를 포함하며, 상기 최종 공격 문자열은 미리 정의된 파라미터를 포함하는 원시 공격 문자열을 필터링하도록 설계된 필터링 로직을 회피하도록 생성된다. 따라서 간단한 필터링을 우회할 수 있는 최종 공격 문자열 생성을 통해 기존 동적 분석기에서 검출하지 못하던 보안 취약점을 검출할 수 있다.
PCT/KR2016/008263 2016-07-19 2016-07-28 공격 문자열 생성 방법 및 장치 Ceased WO2018016669A2 (ko)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US16/318,476 US11496502B2 (en) 2016-07-19 2016-07-28 Method and apparatus for generating attack string
JP2019503340A JP6785360B2 (ja) 2016-07-19 2016-07-28 攻撃文字列生成方法および装置
CN201680087790.9A CN109565499B (zh) 2016-07-19 2016-07-28 攻击字符串生成方法及装置

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR1020160091242A KR101885615B1 (ko) 2016-07-19 2016-07-19 공격 문자열 생성 방법 및 장치
KR10-2016-0091242 2016-07-19

Publications (2)

Publication Number Publication Date
WO2018016669A2 WO2018016669A2 (ko) 2018-01-25
WO2018016669A3 true WO2018016669A3 (ko) 2018-03-08

Family

ID=60993127

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2016/008263 Ceased WO2018016669A2 (ko) 2016-07-19 2016-07-28 공격 문자열 생성 방법 및 장치

Country Status (5)

Country Link
US (1) US11496502B2 (ko)
JP (1) JP6785360B2 (ko)
KR (1) KR101885615B1 (ko)
CN (1) CN109565499B (ko)
WO (1) WO2018016669A2 (ko)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102517387B1 (ko) * 2018-06-27 2023-04-03 구글 엘엘씨 로컬 텍스트-응답 맵을 활용하여 사용자의 음성 발화에 대한 응답 렌더링
KR102231726B1 (ko) 2019-03-28 2021-03-25 네이버클라우드 주식회사 취약점 진단방법 및 이를 위한 진단장치
CN112507347B (zh) * 2020-10-27 2022-06-24 中国科学院信息工程研究所 面向分布式密码破解框架的破解作业描述信息生成方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080044145A (ko) * 2006-11-15 2008-05-20 한국전자통신연구원 웹 로그 상호연관분석을 이용한 웹 애플리케이션 공격의침입 탐지 시스템 및 방법
US20080120722A1 (en) * 2006-11-17 2008-05-22 Caleb Sima Web application assessment based on intelligent generation of attack strings
US20120030516A1 (en) * 2010-04-30 2012-02-02 International Business Machines Corporation Method and system for information processing and test care generation
US20120311713A1 (en) * 2011-05-31 2012-12-06 International Business Machines Corporation Detecting persistent vulnerabilities in web applications
US20130007887A1 (en) * 2011-06-28 2013-01-03 International Business Machines Corporation Black-box testing of web applications with client-side code evaluation

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070261124A1 (en) * 2006-05-03 2007-11-08 International Business Machines Corporation Method and system for run-time dynamic and interactive identification of software authorization requirements and privileged code locations, and for validation of other software program analysis results
US8726394B2 (en) * 2009-12-15 2014-05-13 Seeker Security Ltd. Method and system of runtime analysis
CN101883024B (zh) * 2010-06-23 2012-02-01 南京大学 一种跨站点伪造请求的动态检测方法
CN102136051B (zh) * 2011-05-06 2013-02-20 南开大学 一种应用SGM-SQL注入模型驱动web应用渗透测试的方法
US8695098B2 (en) * 2011-06-30 2014-04-08 International Business Machines Corporation Detecting security vulnerabilities in web applications
US9471787B2 (en) * 2011-08-25 2016-10-18 International Business Machines Corporation Detecting stored cross-site scripting vulnerabilities in web applications
CN102917360B (zh) * 2012-10-24 2015-04-29 北京邮电大学 一种Zigbee协议漏洞的检测装置及方法
US9083736B2 (en) * 2013-01-28 2015-07-14 Hewlett-Packard Development Company, L.P. Monitoring and mitigating client-side exploitation of application flaws
US9507943B1 (en) * 2013-02-19 2016-11-29 Amazon Technologies, Inc. Analysis tool for data security
US10515214B1 (en) * 2013-09-30 2019-12-24 Fireeye, Inc. System and method for classifying malware within content created during analysis of a specimen
US9363284B2 (en) * 2013-12-11 2016-06-07 International Business Machines Corporation Testing web applications for security vulnerabilities with metarequests
US9756074B2 (en) * 2013-12-26 2017-09-05 Fireeye, Inc. System and method for IPS and VM-based detection of suspicious objects
KR101647487B1 (ko) * 2014-05-22 2016-08-10 소프트캠프(주) 패치파일 분석시스템과 분석방법
US10182068B2 (en) * 2014-11-26 2019-01-15 Entit Software Llc Determine vulnerability using runtime agent and network sniffer
US9838417B1 (en) * 2014-12-30 2017-12-05 Fireeye, Inc. Intelligent context aware user interaction for malware detection
CN104683328A (zh) * 2015-01-29 2015-06-03 兴华永恒(北京)科技有限责任公司 一种跨站漏洞扫描方法及系统
US10033747B1 (en) * 2015-09-29 2018-07-24 Fireeye, Inc. System and method for detecting interpreter-based exploit attacks
US10176325B1 (en) * 2016-06-21 2019-01-08 Symantec Corporation System and method for dynamic detection of command and control malware

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080044145A (ko) * 2006-11-15 2008-05-20 한국전자통신연구원 웹 로그 상호연관분석을 이용한 웹 애플리케이션 공격의침입 탐지 시스템 및 방법
US20080120722A1 (en) * 2006-11-17 2008-05-22 Caleb Sima Web application assessment based on intelligent generation of attack strings
US20120030516A1 (en) * 2010-04-30 2012-02-02 International Business Machines Corporation Method and system for information processing and test care generation
US20120311713A1 (en) * 2011-05-31 2012-12-06 International Business Machines Corporation Detecting persistent vulnerabilities in web applications
US20130007887A1 (en) * 2011-06-28 2013-01-03 International Business Machines Corporation Black-box testing of web applications with client-side code evaluation

Also Published As

Publication number Publication date
CN109565499A (zh) 2019-04-02
JP6785360B2 (ja) 2020-11-18
WO2018016669A2 (ko) 2018-01-25
KR101885615B1 (ko) 2018-08-06
CN109565499B (zh) 2022-03-25
US11496502B2 (en) 2022-11-08
US20190297107A1 (en) 2019-09-26
KR20180009510A (ko) 2018-01-29
JP2019521456A (ja) 2019-07-25

Similar Documents

Publication Publication Date Title
Zeng et al. Stability analysis of generalized neural networks with time-varying delays via a new integral inequality
GB2548270A (en) A Method and system for network access control based on traffic monitoring and vulnerability detection using process related information
WO2015173803A3 (en) A system and method for generating detection of hidden relatedness between proteins via a protein connectivity network
WO2014153462A3 (en) Advanced authentication techniques and applications
WO2015104691A3 (en) Systems, methods, and devices for detecting anomalies in an industrial control system
EP4235155A3 (en) Method and robot for multi parameter swimming pool fluid analysis
JP2014179074A5 (ko)
WO2016028067A3 (ko) 시각화를 이용한 악성 코드 탐지 시스템과 방법
EA201492142A1 (ru) Устройства и способы для мультимодального анализа и обработки бурового раствора
WO2014078585A3 (en) Methods, systems and computer readable media for detecting command injection attacks
WO2013170064A3 (en) Methods and apparatus for identifying and removing malicious applications
HK1213107A1 (zh) 裝置,系統和方法識別和減少惡意網絡威脅
RU2017106150A (ru) Преобразование потоков событий
WO2016094182A3 (en) Network device predictive modeling
MX2016014224A (es) Configuracion de flujos de trabajo en un dispositivo anfitrion que funciona en un sistema de control de procesos.
MX2017006097A (es) Libs para caracterizacion de fluido de materiales porosos.
WO2012176978A3 (ko) 네트워크 접근 제어시스템 및 방법
WO2016016724A3 (ko) 패킷 손실 은닉방법 및 장치와 이를 적용한 복호화방법 및 장치
EP2722762A3 (en) Real time control system management
WO2013050953A3 (en) Methods, apparatuses, and computer program products for restricting overlay of an augmentation
HK1254641A1 (zh) 用於分析有关才能和文化发现的认可数据的改进系统和方法
WO2010117153A3 (ko) 휴대단말기에서의 시스템온칩 기반의 악성코드 검출 장치
WO2015029037A3 (en) Method and system handling malware
WO2013160771A3 (en) Method and apparatus for design of pipeline components
WO2018016669A3 (ko) 공격 문자열 생성 방법 및 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16909584

Country of ref document: EP

Kind code of ref document: A2

ENP Entry into the national phase

Ref document number: 2019503340

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16909584

Country of ref document: EP

Kind code of ref document: A2