WO2018016669A3 - 공격 문자열 생성 방법 및 장치 - Google Patents
공격 문자열 생성 방법 및 장치 Download PDFInfo
- Publication number
- WO2018016669A3 WO2018016669A3 PCT/KR2016/008263 KR2016008263W WO2018016669A3 WO 2018016669 A3 WO2018016669 A3 WO 2018016669A3 KR 2016008263 W KR2016008263 W KR 2016008263W WO 2018016669 A3 WO2018016669 A3 WO 2018016669A3
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- attack string
- web application
- execution state
- analyzing
- final attack
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/16—Implementing security features at a particular protocol layer
- H04L63/168—Implementing security features at a particular protocol layer above the transport layer
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Virology (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Bioethics (AREA)
- Computer And Data Communications (AREA)
- Debugging And Monitoring (AREA)
Abstract
웹 애플리케이션의 실행 상태를 분석하는 동적 분석기의 동작 방법이 개시된다. 상기 웹 애플리케이션을 통해 실행될 특정 동작을 지시하는 파라미터를 포함하는 최종 공격 문자열에 기초한 상기 웹 애플리케이션의 실행 상태를 분석하는 단계; 및 웹 애플리케이션의 실행 상태에 대한 분석하는 단계를 포함하며, 상기 최종 공격 문자열은 미리 정의된 파라미터를 포함하는 원시 공격 문자열을 필터링하도록 설계된 필터링 로직을 회피하도록 생성된다. 따라서 간단한 필터링을 우회할 수 있는 최종 공격 문자열 생성을 통해 기존 동적 분석기에서 검출하지 못하던 보안 취약점을 검출할 수 있다.
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/318,476 US11496502B2 (en) | 2016-07-19 | 2016-07-28 | Method and apparatus for generating attack string |
| JP2019503340A JP6785360B2 (ja) | 2016-07-19 | 2016-07-28 | 攻撃文字列生成方法および装置 |
| CN201680087790.9A CN109565499B (zh) | 2016-07-19 | 2016-07-28 | 攻击字符串生成方法及装置 |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1020160091242A KR101885615B1 (ko) | 2016-07-19 | 2016-07-19 | 공격 문자열 생성 방법 및 장치 |
| KR10-2016-0091242 | 2016-07-19 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| WO2018016669A2 WO2018016669A2 (ko) | 2018-01-25 |
| WO2018016669A3 true WO2018016669A3 (ko) | 2018-03-08 |
Family
ID=60993127
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/KR2016/008263 Ceased WO2018016669A2 (ko) | 2016-07-19 | 2016-07-28 | 공격 문자열 생성 방법 및 장치 |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US11496502B2 (ko) |
| JP (1) | JP6785360B2 (ko) |
| KR (1) | KR101885615B1 (ko) |
| CN (1) | CN109565499B (ko) |
| WO (1) | WO2018016669A2 (ko) |
Families Citing this family (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR102517387B1 (ko) * | 2018-06-27 | 2023-04-03 | 구글 엘엘씨 | 로컬 텍스트-응답 맵을 활용하여 사용자의 음성 발화에 대한 응답 렌더링 |
| KR102231726B1 (ko) | 2019-03-28 | 2021-03-25 | 네이버클라우드 주식회사 | 취약점 진단방법 및 이를 위한 진단장치 |
| CN112507347B (zh) * | 2020-10-27 | 2022-06-24 | 中国科学院信息工程研究所 | 面向分布式密码破解框架的破解作业描述信息生成方法 |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20080044145A (ko) * | 2006-11-15 | 2008-05-20 | 한국전자통신연구원 | 웹 로그 상호연관분석을 이용한 웹 애플리케이션 공격의침입 탐지 시스템 및 방법 |
| US20080120722A1 (en) * | 2006-11-17 | 2008-05-22 | Caleb Sima | Web application assessment based on intelligent generation of attack strings |
| US20120030516A1 (en) * | 2010-04-30 | 2012-02-02 | International Business Machines Corporation | Method and system for information processing and test care generation |
| US20120311713A1 (en) * | 2011-05-31 | 2012-12-06 | International Business Machines Corporation | Detecting persistent vulnerabilities in web applications |
| US20130007887A1 (en) * | 2011-06-28 | 2013-01-03 | International Business Machines Corporation | Black-box testing of web applications with client-side code evaluation |
Family Cites Families (18)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20070261124A1 (en) * | 2006-05-03 | 2007-11-08 | International Business Machines Corporation | Method and system for run-time dynamic and interactive identification of software authorization requirements and privileged code locations, and for validation of other software program analysis results |
| US8726394B2 (en) * | 2009-12-15 | 2014-05-13 | Seeker Security Ltd. | Method and system of runtime analysis |
| CN101883024B (zh) * | 2010-06-23 | 2012-02-01 | 南京大学 | 一种跨站点伪造请求的动态检测方法 |
| CN102136051B (zh) * | 2011-05-06 | 2013-02-20 | 南开大学 | 一种应用SGM-SQL注入模型驱动web应用渗透测试的方法 |
| US8695098B2 (en) * | 2011-06-30 | 2014-04-08 | International Business Machines Corporation | Detecting security vulnerabilities in web applications |
| US9471787B2 (en) * | 2011-08-25 | 2016-10-18 | International Business Machines Corporation | Detecting stored cross-site scripting vulnerabilities in web applications |
| CN102917360B (zh) * | 2012-10-24 | 2015-04-29 | 北京邮电大学 | 一种Zigbee协议漏洞的检测装置及方法 |
| US9083736B2 (en) * | 2013-01-28 | 2015-07-14 | Hewlett-Packard Development Company, L.P. | Monitoring and mitigating client-side exploitation of application flaws |
| US9507943B1 (en) * | 2013-02-19 | 2016-11-29 | Amazon Technologies, Inc. | Analysis tool for data security |
| US10515214B1 (en) * | 2013-09-30 | 2019-12-24 | Fireeye, Inc. | System and method for classifying malware within content created during analysis of a specimen |
| US9363284B2 (en) * | 2013-12-11 | 2016-06-07 | International Business Machines Corporation | Testing web applications for security vulnerabilities with metarequests |
| US9756074B2 (en) * | 2013-12-26 | 2017-09-05 | Fireeye, Inc. | System and method for IPS and VM-based detection of suspicious objects |
| KR101647487B1 (ko) * | 2014-05-22 | 2016-08-10 | 소프트캠프(주) | 패치파일 분석시스템과 분석방법 |
| US10182068B2 (en) * | 2014-11-26 | 2019-01-15 | Entit Software Llc | Determine vulnerability using runtime agent and network sniffer |
| US9838417B1 (en) * | 2014-12-30 | 2017-12-05 | Fireeye, Inc. | Intelligent context aware user interaction for malware detection |
| CN104683328A (zh) * | 2015-01-29 | 2015-06-03 | 兴华永恒(北京)科技有限责任公司 | 一种跨站漏洞扫描方法及系统 |
| US10033747B1 (en) * | 2015-09-29 | 2018-07-24 | Fireeye, Inc. | System and method for detecting interpreter-based exploit attacks |
| US10176325B1 (en) * | 2016-06-21 | 2019-01-08 | Symantec Corporation | System and method for dynamic detection of command and control malware |
-
2016
- 2016-07-19 KR KR1020160091242A patent/KR101885615B1/ko active Active
- 2016-07-28 JP JP2019503340A patent/JP6785360B2/ja active Active
- 2016-07-28 CN CN201680087790.9A patent/CN109565499B/zh not_active Expired - Fee Related
- 2016-07-28 US US16/318,476 patent/US11496502B2/en active Active
- 2016-07-28 WO PCT/KR2016/008263 patent/WO2018016669A2/ko not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20080044145A (ko) * | 2006-11-15 | 2008-05-20 | 한국전자통신연구원 | 웹 로그 상호연관분석을 이용한 웹 애플리케이션 공격의침입 탐지 시스템 및 방법 |
| US20080120722A1 (en) * | 2006-11-17 | 2008-05-22 | Caleb Sima | Web application assessment based on intelligent generation of attack strings |
| US20120030516A1 (en) * | 2010-04-30 | 2012-02-02 | International Business Machines Corporation | Method and system for information processing and test care generation |
| US20120311713A1 (en) * | 2011-05-31 | 2012-12-06 | International Business Machines Corporation | Detecting persistent vulnerabilities in web applications |
| US20130007887A1 (en) * | 2011-06-28 | 2013-01-03 | International Business Machines Corporation | Black-box testing of web applications with client-side code evaluation |
Also Published As
| Publication number | Publication date |
|---|---|
| CN109565499A (zh) | 2019-04-02 |
| JP6785360B2 (ja) | 2020-11-18 |
| WO2018016669A2 (ko) | 2018-01-25 |
| KR101885615B1 (ko) | 2018-08-06 |
| CN109565499B (zh) | 2022-03-25 |
| US11496502B2 (en) | 2022-11-08 |
| US20190297107A1 (en) | 2019-09-26 |
| KR20180009510A (ko) | 2018-01-29 |
| JP2019521456A (ja) | 2019-07-25 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zeng et al. | Stability analysis of generalized neural networks with time-varying delays via a new integral inequality | |
| GB2548270A (en) | A Method and system for network access control based on traffic monitoring and vulnerability detection using process related information | |
| WO2015173803A3 (en) | A system and method for generating detection of hidden relatedness between proteins via a protein connectivity network | |
| WO2014153462A3 (en) | Advanced authentication techniques and applications | |
| WO2015104691A3 (en) | Systems, methods, and devices for detecting anomalies in an industrial control system | |
| EP4235155A3 (en) | Method and robot for multi parameter swimming pool fluid analysis | |
| JP2014179074A5 (ko) | ||
| WO2016028067A3 (ko) | 시각화를 이용한 악성 코드 탐지 시스템과 방법 | |
| EA201492142A1 (ru) | Устройства и способы для мультимодального анализа и обработки бурового раствора | |
| WO2014078585A3 (en) | Methods, systems and computer readable media for detecting command injection attacks | |
| WO2013170064A3 (en) | Methods and apparatus for identifying and removing malicious applications | |
| HK1213107A1 (zh) | 裝置,系統和方法識別和減少惡意網絡威脅 | |
| RU2017106150A (ru) | Преобразование потоков событий | |
| WO2016094182A3 (en) | Network device predictive modeling | |
| MX2016014224A (es) | Configuracion de flujos de trabajo en un dispositivo anfitrion que funciona en un sistema de control de procesos. | |
| MX2017006097A (es) | Libs para caracterizacion de fluido de materiales porosos. | |
| WO2012176978A3 (ko) | 네트워크 접근 제어시스템 및 방법 | |
| WO2016016724A3 (ko) | 패킷 손실 은닉방법 및 장치와 이를 적용한 복호화방법 및 장치 | |
| EP2722762A3 (en) | Real time control system management | |
| WO2013050953A3 (en) | Methods, apparatuses, and computer program products for restricting overlay of an augmentation | |
| HK1254641A1 (zh) | 用於分析有关才能和文化发现的认可数据的改进系统和方法 | |
| WO2010117153A3 (ko) | 휴대단말기에서의 시스템온칩 기반의 악성코드 검출 장치 | |
| WO2015029037A3 (en) | Method and system handling malware | |
| WO2013160771A3 (en) | Method and apparatus for design of pipeline components | |
| WO2018016669A3 (ko) | 공격 문자열 생성 방법 및 장치 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16909584 Country of ref document: EP Kind code of ref document: A2 |
|
| ENP | Entry into the national phase |
Ref document number: 2019503340 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16909584 Country of ref document: EP Kind code of ref document: A2 |