Taeguen Kim

Learn More
Dynamic Taint Analysis (DTA) is an approach used for software testing and vulnerability analysis. The vanilla DTA method is widely used, but its simple taint propagation does not consider any control dependency. Therefore, vanilla DTA generally suffers from the under-tainting caused by control dependency. The under-tainting can be problematic when analyzers(More)
Depending on expansion of supply of smartphone, development of mobile application is more active using various mobile platform. As a result of malicious applications, but also targeting the mobile it is rapidly increasing. In this paper, method of Android malware similarity and clustering. First, there is a need for a process for extracting the control flow(More)
The number of malware has sharply increased over years, and it caused various damages on computing systems and data. In this paper, we propose techniques to detect malware variants. Malware authors usually reuse malware modules when they generate new malware or malware variants. Therefore, malware variants have common code for some functions in their binary(More)
As attackers make variants of existing malware, it is possible to detect unknown malware by comparing with already-known malware's information. Control flow graphs have been used in dynamic analysis of program source code. In this paper, we proposed a new method which can analyze and detect malware binaries using control flow graphs and Bloom filter by(More)
Among all the security technologies of smartphones, biometrics authentication technologies are on the rise to provide higher reliability and security. However, existing biometric authentication methods, such as fingerprints and voice recognition have some drawbacks. For example, many biometric authentication methods require special devices to collect(More)
In order to use mobile devices safely, many researchers have worked on topics related to mobile security like user authentication. This paper proposes a user authentication method using users' biometric information. The propose system uses the device movement data that are obtained when a user shakes his or her mobile device. To capture the biometric(More)
We suggest an efficient framework to detect malware in Intrusion Detection System (IDS). The framework generates signatures from malware families and generates corresponding detection rules. The generated signatures are not influenced by small changes of malware while they can be used to detect malware that has similar behaviors with normal programs. Our(More)
  • 1