KR102284646B1 - 문서 파일에 구성된 매크로의 악성코드 감염 확인 방법과 시스템 - Google Patents
문서 파일에 구성된 매크로의 악성코드 감염 확인 방법과 시스템 Download PDFInfo
- Publication number
- KR102284646B1 KR102284646B1 KR1020190133448A KR20190133448A KR102284646B1 KR 102284646 B1 KR102284646 B1 KR 102284646B1 KR 1020190133448 A KR1020190133448 A KR 1020190133448A KR 20190133448 A KR20190133448 A KR 20190133448A KR 102284646 B1 KR102284646 B1 KR 102284646B1
- Authority
- KR
- South Korea
- Prior art keywords
- macro
- function
- document file
- malicious code
- execution
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/565—Static detection by checking file integrity
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
- Document Processing Apparatus (AREA)
Abstract
Description
도 2는 본 발명에 따른 감염 확인 방법의 일 실시 예가 보안대상 문서파일을 확인해서 해당 매크로 함수를 커스텀 함수로 변경하는 과정을 순차로 도시한 플로차트이고,
도 3은 본 발명에 따른 감염 확인 방법의 일 실시 예가 보안대상 문서파일을 실행하는 과정을 순차로 도시한 플로차트이고,
도 4는 본 발명에 따른 감염 확인 방법에 따른 프로세싱 중에 표출된 알림 UI의 일 예를 보인 이미지이다.
Claims (7)
- 컴퓨터 OS와 연동하는 매크로 검출모듈이 입력 프로세서로 입력되는 문서파일을 확인하는 제1 확인 단계;
상기 매크로 검출모듈이 문서파일에 구성된 매크로 함수를 코드정보 저장부에 저장된 악성코드 정보에 따라 탐색해서 추출하는 추출 단계;
추출된 상기 매크로 함수의 악성코드를 매크로 검출모듈이 검출하는 검출 단계;
보안처리모듈이 악성코드가 검출된 매크로 함수를 커스텀 함수로 변경하는 함수 설정 단계;
상기 보안처리모듈이 문서파일 실행 시 문서파일에 커스텀 함수의 존재 여부를 확인해서 커스텀 함수가 미확인되면 후속 절차 없이 문서파일을 실행하고, 상기 커스텀 함수가 확인되면 해당하는 매크로 함수의 실행 이벤트를 확인해서 위험도에 따라 강제 차단 등급과 선택적 차단 등급과 정상 실행 등급으로 분류해 확정하는 제2 확인 단계;
상기 보안처리모듈이 실행 대상 매크로 함수의 등급을 확인해서 강제 차단 등급으로 확인되면 매크로 함수의 실행을 강제 차단하고, 실행 대상 매크로 함수의 등급이 선택적 차단 등급으로 확인되면 해당 매크로 함수의 실행 여부를 질의하여 실행 여부를 결정하는 실행 선택 단계; 및
상기 실행 선택 단계에서 해당 매크로 함수의 실행이 선택값으로 수집되면, 상기 보안처리모듈은 매크로 함수의 중단을 해제하고, 워드프로세서는 상기 문서파일의 해당 매크로 함수를 실행하는 단계;
를 포함하는 것을 특징으로 하는 문서 파일에 구성된 매크로의 악성코드 감염 확인 방법. - 삭제
- 삭제
- 삭제
- 삭제
- 삭제
- 삭제
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1020190133448A KR102284646B1 (ko) | 2019-10-25 | 2019-10-25 | 문서 파일에 구성된 매크로의 악성코드 감염 확인 방법과 시스템 |
| JP2020178133A JP7657415B2 (ja) | 2019-10-25 | 2020-10-23 | 文書ファイルに構成されたマクロのマルウェア感染確認方法及びシステム |
| US17/078,908 US20210124827A1 (en) | 2019-10-25 | 2020-10-23 | Method and system for checking malware infection of macro included in document file |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR1020190133448A KR102284646B1 (ko) | 2019-10-25 | 2019-10-25 | 문서 파일에 구성된 매크로의 악성코드 감염 확인 방법과 시스템 |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| KR20210049308A KR20210049308A (ko) | 2021-05-06 |
| KR102284646B1 true KR102284646B1 (ko) | 2021-08-03 |
Family
ID=75585906
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| KR1020190133448A Active KR102284646B1 (ko) | 2019-10-25 | 2019-10-25 | 문서 파일에 구성된 매크로의 악성코드 감염 확인 방법과 시스템 |
Country Status (3)
| Country | Link |
|---|---|
| US (1) | US20210124827A1 (ko) |
| JP (1) | JP7657415B2 (ko) |
| KR (1) | KR102284646B1 (ko) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114065203B (zh) * | 2021-11-29 | 2025-02-14 | 绿盟科技集团股份有限公司 | 富文本文档的风险检测方法、装置及可读存储介质 |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2018508054A (ja) * | 2014-11-26 | 2018-03-22 | グラスウォール・(アイピー)・リミテッド | ファイルベースコンテンツが持つリスク判定のための統計分析手法 |
| KR101851233B1 (ko) * | 2018-02-13 | 2018-04-23 | (주)지란지교시큐리티 | 파일 내 포함된 악성 위협 탐지 장치 및 방법, 그 기록매체 |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20080083012A1 (en) * | 2006-06-26 | 2008-04-03 | Dachuan Yu | Program instrumentation method and apparatus for constraining the behavior of embedded script in documents |
| US8713584B2 (en) * | 2009-08-13 | 2014-04-29 | Google Inc. | Event-triggered server-side macros |
| CN102663296B (zh) | 2012-03-31 | 2015-01-07 | 杭州安恒信息技术有限公司 | 面向网页JavaScript恶意代码的智能检测方法 |
| CN103810428B (zh) * | 2014-02-24 | 2017-05-24 | 珠海市君天电子科技有限公司 | 一种宏病毒检测方法及装置 |
| JP6297425B2 (ja) | 2014-06-25 | 2018-03-20 | エヌ・ティ・ティ・コミュニケーションズ株式会社 | 攻撃コード検出装置、攻撃コード検出方法、及びプログラム |
| KR101745873B1 (ko) | 2015-12-18 | 2017-06-27 | 고려대학교 산학협력단 | 악성 문서 파일 식별 시스템 및 방법 |
-
2019
- 2019-10-25 KR KR1020190133448A patent/KR102284646B1/ko active Active
-
2020
- 2020-10-23 US US17/078,908 patent/US20210124827A1/en not_active Abandoned
- 2020-10-23 JP JP2020178133A patent/JP7657415B2/ja active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP2018508054A (ja) * | 2014-11-26 | 2018-03-22 | グラスウォール・(アイピー)・リミテッド | ファイルベースコンテンツが持つリスク判定のための統計分析手法 |
| KR101851233B1 (ko) * | 2018-02-13 | 2018-04-23 | (주)지란지교시큐리티 | 파일 내 포함된 악성 위협 탐지 장치 및 방법, 그 기록매체 |
Also Published As
| Publication number | Publication date |
|---|---|
| KR20210049308A (ko) | 2021-05-06 |
| US20210124827A1 (en) | 2021-04-29 |
| JP2021068452A (ja) | 2021-04-30 |
| JP7657415B2 (ja) | 2025-04-07 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Yakura et al. | Malware analysis of imaged binary samples by convolutional neural network with attention mechanism | |
| JP7023259B2 (ja) | 悪意あるファイルを検出するためのシステムおよび方法 | |
| US11188649B2 (en) | System and method for classification of objects of a computer system | |
| US9553889B1 (en) | System and method of detecting malicious files on mobile devices | |
| WO2020108357A1 (zh) | 一种程序分类模型训练方法、程序分类方法及装置 | |
| US10956151B2 (en) | Apparatus and method for identifying constituent parts of software binaries | |
| Rohith et al. | A comprehensive study on malware detection and prevention techniques used by anti-virus | |
| CN111651768B (zh) | 计算机二进制程序的链接库函数名识别方法及装置 | |
| US12493693B2 (en) | Systems and methods for selecting client backup files for maliciousness analysis | |
| EP3792799B1 (en) | System and method of reducing a number of false positives in classification of files | |
| US20200257811A1 (en) | System and method for performing a task based on access rights determined from a danger level of the task | |
| EP3113065A1 (en) | System and method of detecting malicious files on mobile devices | |
| KR102284646B1 (ko) | 문서 파일에 구성된 매크로의 악성코드 감염 확인 방법과 시스템 | |
| EP3767507A1 (en) | Data processing method against ransomware, program for executing same, and computer-readable recording medium with program recorded thereon | |
| US11366902B2 (en) | System and method of detecting malicious files based on file fragments | |
| Rimon et al. | Malware detection and classification using hybrid machine learning algorithm | |
| JP7314243B2 (ja) | マルウェアの悪意ある行為フィーチャー情報を生成する方法 | |
| US11222113B1 (en) | Automatically generating malware definitions using word-level analysis | |
| US11941118B2 (en) | System and method to build robust classifiers against evasion attacks | |
| WO2022264331A1 (ja) | 攻撃検知装置、敵対的サンプルパッチ検知システム、攻撃検知方法、及び、攻撃検知プログラム | |
| CN113110986A (zh) | 一种WebShell脚本文件的检测方法及系统 | |
| KR101880689B1 (ko) | 악성코드 진단장치 및 방법 | |
| JP7101920B2 (ja) | 攻撃検知システム、攻撃検知方法および攻撃検知プログラム | |
| EP3694176A1 (en) | System and method for performing a task based on access rights determined from a danger level of the task | |
| CN118916880B (zh) | 一种u盘隔离病毒数据传输方法、系统和u盘 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PA0109 | Patent application |
St.27 status event code: A-0-1-A10-A12-nap-PA0109 |
|
| PA0201 | Request for examination |
St.27 status event code: A-1-2-D10-D11-exm-PA0201 |
|
| P11-X000 | Amendment of application requested |
St.27 status event code: A-2-2-P10-P11-nap-X000 |
|
| P13-X000 | Application amended |
St.27 status event code: A-2-2-P10-P13-nap-X000 |
|
| PN2301 | Change of applicant |
St.27 status event code: A-3-3-R10-R13-asn-PN2301 St.27 status event code: A-3-3-R10-R11-asn-PN2301 |
|
| D13-X000 | Search requested |
St.27 status event code: A-1-2-D10-D13-srh-X000 |
|
| D14-X000 | Search report completed |
St.27 status event code: A-1-2-D10-D14-srh-X000 |
|
| PE0902 | Notice of grounds for rejection |
St.27 status event code: A-1-2-D10-D21-exm-PE0902 |
|
| E13-X000 | Pre-grant limitation requested |
St.27 status event code: A-2-3-E10-E13-lim-X000 |
|
| P11-X000 | Amendment of application requested |
St.27 status event code: A-2-2-P10-P11-nap-X000 |
|
| P13-X000 | Application amended |
St.27 status event code: A-2-2-P10-P13-nap-X000 |
|
| PG1501 | Laying open of application |
St.27 status event code: A-1-1-Q10-Q12-nap-PG1501 |
|
| E701 | Decision to grant or registration of patent right | ||
| PE0701 | Decision of registration |
St.27 status event code: A-1-2-D10-D22-exm-PE0701 |
|
| GRNT | Written decision to grant | ||
| PR0701 | Registration of establishment |
St.27 status event code: A-2-4-F10-F11-exm-PR0701 |
|
| PR1002 | Payment of registration fee |
St.27 status event code: A-2-2-U10-U11-oth-PR1002 Fee payment year number: 1 |
|
| PG1601 | Publication of registration |
St.27 status event code: A-4-4-Q10-Q13-nap-PG1601 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 4 |
|
| PR1001 | Payment of annual fee |
St.27 status event code: A-4-4-U10-U11-oth-PR1001 Fee payment year number: 5 |
|
| R18-X000 | Changes to party contact information recorded |
St.27 status event code: A-5-5-R10-R18-oth-X000 |