摘要:
An apparatus and method for detecting an unknown malicious code embedded in an office document are provided. The method includes the steps of: (a) when the office document is opened, previously checking whether or not the office document has an office document extension name, using a program for checking the malicious code in the office document; (b) determining whether or not the office document having the extension name has a macro function; (c) if it is determined from the determination result of the step (b) that the office document has the macro function, determining whether or not the office document has an execution code/whether or not the execution code is executable; (d) if it is determined from the determination result of the step (c) that the execution code is executable, detecting whether or not the malicious code is embedded in the office document; and (e) on the basis of the result of the step (d), determining whether or not the office document is executed.
摘要:
Provided are an apparatus and method for safely removing a malicious code from a file, or reporting the probable presence of a malicious code when it cannot be removed safely.The method includes: determining whether a file is a document or image file; opening and saving the document file as a new file by using an application associated with the document file to remove a malicious code from the document file, when it is determined that the file is the document file; and converting the image file into a different file format from a present file format and saving the converted image file to remove a malicious code from the image file, when it is determined that the file is the image file.
摘要:
Provided is an apparatus and method for automatically analyzing a program in order to detect window malicious codes that are programmed to perform malicious behaviors when a specific event occurs, when the specific event does not occur, when a specific program execution condition is satisfied, and when the specific program execution condition is not satisfied.
摘要:
Provided are an apparatus and method for safely removing a malicious code from a file, or reporting the probable presence of a malicious code when it cannot be removed safely.The method includes: determining whether a file is a document or image file; opening and saving the document file as a new file by using an application associated with the document file to remove a malicious code from the document file, when it is determined that the file is the document file; and converting the image file into a different file format from a present file format and saving the converted image file to remove a malicious code from the image file, when it is determined that the file is the image file.
摘要:
Provided are an apparatus, system and method for detecting malicious code inserted into a normal process in disguise. The apparatus includes a malicious code detection module for extracting information on a thread generated by a process running on a computer system to identify code related to the thread, preliminarily determining whether or not the identified code is malicious and extracting the code preliminarily determined to be malicious; and a forcible malicious code termination module for finally determining the code as malicious code based on an analysis result of behavior of the extracted code executed in a virtual environment and forcibly terminating execution of the code.
摘要:
Provided are an apparatus, system and method for detecting malicious code inserted into a normal process in disguise. The apparatus includes a malicious code detection module for extracting information on a thread generated by a process running on a computer system to identify code related to the thread, preliminarily determining whether or not the identified code is malicious and extracting the code preliminarily determined to be malicious; and a forcible malicious code termination module for finally determining the code as malicious code based on an analysis result of behavior of the extracted code executed in a virtual environment and forcibly terminating execution of the code.
摘要:
A defense method and device against intelligent bots using masqueraded virtual machine information are provided. The method includes performing global hooking on a virtual machine detection request transmitted by a process, determining, on the basis of pre-stored malicious process information, whether or not the process transmitting the virtual machine detection request corresponds to a malicious process, and when the process is found to correspond to the malicious process as a result of the determination, determining that the process is generated by the intelligent bot, and returning the masqueraded virtual machine information to the process.
摘要:
Disclosed is a hybrid LED chip: comprising a first clad layer of P-type semiconductor material; a second clad layer of N-type semiconductor material; an active layer between the first and second clad layers; a first bonding metal layer on the first clad layer; a second bonding metal layer on the second clad layer; a ceramic substrate positioned on and bonded to the first and second bonding metal layers, wherein the ceramic substrate includes at least one first via hole to expose the first bonding metal layer, and at least one second via hole to expose the second bonding metal layer; a P-type electrode formed by burying a conductive material in the at least one first via hole; and an N-type electrode formed by burying a conductive material in the at least one second via hole, wherein the first and second via holes in the ceramic substrate are formed in cylindrical shapes, and the circumferential surface of each cylindrical shape is provided with an intaglio pattern.
摘要:
A first metal plate for transmission and a second metal plate for transmission are closely-attached to a first surface and a second surface of a dielectric body, respectively. An outer edge of the first metal plate substantially symmetrically faces an outer edge of the second metal plate via the dielectric body. A metal plate for matching is arranged inside a hole formed on the second metal plate, with a slit formed with an inner wall of the hole, and is fixed to the dielectric body. The metal plate for matching is electrically connected to the first metal plate via a through hole penetrating the dielectric body. An IC chip is surface-mounted to connect the second metal plate with the metal plate for matching.
摘要:
Disclosed is a hybrid LED chip: comprising a first clad layer of P-type semiconductor material; a second clad layer of N-type semiconductor material; an active layer between the first and second clad layers; a first bonding metal layer on the first clad layer; a second bonding metal layer on the second clad layer; a ceramic substrate positioned on and bonded to the first and second bonding metal layers, wherein the ceramic substrate includes at least one first via hole to expose the first bonding metal layer, and at least one second via hole to expose the second bonding metal layer; a P-type electrode formed by burying a conductive material in the at least one first via hole; and an N-type electrode formed by burying a conductive material in the at least one second via hole, wherein the first and second via holes in the ceramic substrate are formed in cylindrical shapes, and the circumferential surface of each cylindrical shape is provided with an intaglio pattern.