摘要:
An apparatus and method for detecting an unknown malicious code embedded in an office document are provided. The method includes the steps of: (a) when the office document is opened, previously checking whether or not the office document has an office document extension name, using a program for checking the malicious code in the office document; (b) determining whether or not the office document having the extension name has a macro function; (c) if it is determined from the determination result of the step (b) that the office document has the macro function, determining whether or not the office document has an execution code/whether or not the execution code is executable; (d) if it is determined from the determination result of the step (c) that the execution code is executable, detecting whether or not the malicious code is embedded in the office document; and (e) on the basis of the result of the step (d), determining whether or not the office document is executed.
摘要:
Provided are an apparatus and method for safely removing a malicious code from a file, or reporting the probable presence of a malicious code when it cannot be removed safely.The method includes: determining whether a file is a document or image file; opening and saving the document file as a new file by using an application associated with the document file to remove a malicious code from the document file, when it is determined that the file is the document file; and converting the image file into a different file format from a present file format and saving the converted image file to remove a malicious code from the image file, when it is determined that the file is the image file.
摘要:
Provided is an apparatus and method for automatically analyzing a program in order to detect window malicious codes that are programmed to perform malicious behaviors when a specific event occurs, when the specific event does not occur, when a specific program execution condition is satisfied, and when the specific program execution condition is not satisfied.
摘要:
Provided are an apparatus and method for safely removing a malicious code from a file, or reporting the probable presence of a malicious code when it cannot be removed safely.The method includes: determining whether a file is a document or image file; opening and saving the document file as a new file by using an application associated with the document file to remove a malicious code from the document file, when it is determined that the file is the document file; and converting the image file into a different file format from a present file format and saving the converted image file to remove a malicious code from the image file, when it is determined that the file is the image file.
摘要:
Disclosed is a method and apparatus for linearizing a power amplifier using a digital signal process (DSP), and particularly, is a method and apparatus for effectively linearizing an amplifier which has a plurality of distortion generating sources. To this end, there is a plurality of compensation methods and compensation units which can generate inverse distortion signals corresponding to the distortion components outputted by the plurality of distortion generating sources, thereby making it possible to provide superior linearity.
摘要:
Disclosed is a method and apparatus for linearizing a power amplifier using a digital signal process (DSP), and particularly, is a method and apparatus for effectively linearizing an amplifier which has a plurality of distortion generating sources. To this end, there is a plurality of compensation methods and compensation units which can generate inverse distortion signals corresponding to the distortion components outputted by the plurality of distortion generating sources, thereby making it possible to provide superior linearity.