-
公开(公告)号:US20240135003A1
公开(公告)日:2024-04-25
申请号:US18142257
申请日:2023-05-01
Inventor: Heejo LEE , Hyunji HONG
CPC classification number: G06F21/577 , G06F21/552
Abstract: According to some exemplary embodiments of the present disclosure, disclosed is a method for building a vulnerability database, which is performed by a computing device. The method may include collecting a security patch from a data source based on a direct patch link; collecting the security patch from the data source based on an indirect patch link; and collecting the security patch from the data source based on an invisible patch link. The patch information of a vulnerability can be used for verifying the existence of the vulnerability, as well as fixing the vulnerability of target software.
-
公开(公告)号:US20220236984A1
公开(公告)日:2022-07-28
申请号:US17525126
申请日:2021-11-12
Inventor: Heejo LEE , Seunghoon WOO
IPC: G06F8/75
Abstract: According to some exemplary embodiments of the present disclosure, a method for identifying open source software (OSS) components using a processor of a computing device is disclosed. The method for identifying open source software (OSS) components may include: constructing a component database by performing redundancy elimination for each of a plurality of open source software; and identifying a component of target software by using the component database.
-
公开(公告)号:US20240232380A9
公开(公告)日:2024-07-11
申请号:US18142257
申请日:2023-05-02
Inventor: Heejo LEE , Hyunji HONG
CPC classification number: G06F21/577 , G06F21/552
Abstract: According to some exemplary embodiments of the present disclosure, disclosed is a method for building a vulnerability database, which is performed by a computing device. The method may include collecting a security patch from a data source based on a direct patch link; collecting the security patch from the data source based on an indirect patch link; and collecting the security patch from the data source based on an invisible patch link. The patch information of a vulnerability can be used for verifying the existence of the vulnerability, as well as fixing the vulnerability of target software.
-
公开(公告)号:US20190394652A1
公开(公告)日:2019-12-26
申请号:US16480595
申请日:2017-05-08
Inventor: Cheolseung KIM , Byeongrim JO , Seongsoo KIM , Heejo LEE , Choongin LEE , Donghyeok KIM
Abstract: A vehicular electronic device hacking test apparatus includes a transmitter, a receiver, and a processor configured to classify a communication-connection procedure into a plurality of states based on a preset communication protocol, to generate a mutated packet appropriate for the plurality of states, and to transmit a vehicular electronic device through the transmitter, and to determine whether the vehicular electronic device is vulnerable to hacking based on whether a reception packet corresponding to the mutated packet is received through the receiver.
-
公开(公告)号:US20180309854A1
公开(公告)日:2018-10-25
申请号:US15955104
申请日:2018-04-17
Inventor: Heejo LEE , Choongin LEE , Jeong-Han BAE
Abstract: A protocol model generator according to the present disclosure includes: a memory in which a protocol model generating program is stored; and a processor configured to execute the program. Herein, upon execution of the program, the processor extracts multiple strings from a binary corresponding to a protocol, generates a message pool including multiple candidate messages to be used in the protocol corresponding to the binary on the basis of the extracted multiple strings, and generates a protocol model corresponding to the protocol and configured to include nodes corresponding to the respective candidate messages included in the message pool. Further, the candidate messages include messages generated on the basis of the strings and response messages generated corresponding to the messages, and the protocol model is generated including one or more nodes and transition information between the nodes.
-
-
-
-