首页> 外国专利> THREAT DETECTION SYSTEM TO COMPARATIVE ANALYSIS OF INSTALLER FILE BASED ON SBOM WITH POINT OF VIEW OF CONSUMER

THREAT DETECTION SYSTEM TO COMPARATIVE ANALYSIS OF INSTALLER FILE BASED ON SBOM WITH POINT OF VIEW OF CONSUMER

机译:基于SBOM的安装程序文件威胁检测系统与消费者视角的对比分析

摘要

The present invention relates to a threat factor detection system and detection method through comparative analysis of SBOM-based installation files from the consumer's perspective, which can determine the presence of malicious code by analyzing the patch file of the software. SBOM (Software Bill of Materials) information about the type of API function and the parameters of the corresponding API function at the time of calling the API function is saved as previous component information, and the type of API function and API function for executing the installation file to be confirmed A reference information DB that stores SBOM information about the parameters of the corresponding API function as the next component information at the time of calling; a component decomposition module that extracts components of the installation file input to the client terminal; To extract the SBOM of the above component, check the API function, check the monitored API function called when running malicious code by setting the status value for the API function, and link the code block of the monitored API function with a disassembler. Extract, backtrack the code call information for the code block of the API function to be monitored, check the parameters at the time of call, and generate SBOM information about the type and parameters of the API function for which the parameters were confirmed as the following component information to use as a standard. API information extraction module stored in information DB; It includes a comparative analysis module that compares the next component information generated by the API information extraction module with the previous component information of the corresponding API function to check whether they match.
机译:本发明涉及一种威胁因素检测系统及检测方法,通过从消费者的角度对基于SBOM的安装文件进行对比分析,通过分析软件的补丁文件,可以确定是否存在恶意代码。调用API函数时,有关API函数类型和相应API函数参数的SBOM(Software Bill of Materials)信息将保存为先前的组件信息,并且要确认的API函数的类型和执行安装文件的API函数的引用信息DB,该DB将有关相应API函数的参数的SBOM信息存储为当时的下一个组件信息。的呼唤;组件分解模块,用于将安装文件输入的组件提取到客户端;如需提取上述组件的 SBOM,需要检查 API 函数,通过设置 API 函数的状态值,检查运行恶意代码时调用的被监控的 API 函数,并将被监控的 API 函数的代码块与反汇编器链接。对待监控的API函数的代码块进行代码调用信息的提取、回溯,在调用时检查参数,并生成确认参数的API函数类型和参数的SBOM信息,作为以下组件信息作为标准使用。API信息抽取模块存储在信息DB中;它包括一个比较分析模块,该模块将API信息提取模块生成的下一个组件信息与相应API函数的前一个组件信息进行比较,以检查它们是否匹配。

著录项

  • 公开/公告号KR1020240085924A;KR2024100085924A;KR20240085924A;

    专利类型

  • 公开/公告日2024-06-18

    原文格式PDF

  • 申请/专利权人 레드펜소프트 주식회사;

    申请/专利号KR1020220170270;KR202200000170270A;KR20220170270A;

  • 发明设计人

    申请日2022-12-08

  • 分类号G06F21/56;G06F21/53;G06F21/54;

  • 国家

  • 入库时间 2024-12-26 18:11:00

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号