METHOD FOR DETECTING MALICIOUS MACRO IN NON-EXECUTABLE FILE BY USING OCR TECHNOLOGY, AND APPARATUS THEREFOR
In the present specification, a method by which a server detects a malicious macro in a non-executable file by using optical character recognition (OCR) makes it possible to: extract a character string of the non-executable file by using OCR; compare 1) a suspicious malicious character string relate...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; kor |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In the present specification, a method by which a server detects a malicious macro in a non-executable file by using optical character recognition (OCR) makes it possible to: extract a character string of the non-executable file by using OCR; compare 1) a suspicious malicious character string related to clearing of security settings of the macro with 2) the extracted character string; and analyze, on the basis of matching between the suspicious malicious character string and the extracted character string, whether the malicious macro is included in the non-executable file.
Dans la présente invention, un procédé par lequel un serveur détecte une macro malveillante dans un fichier non exécutable par reconnaissance optique de caractères (OCR) permet : d'extraire une chaîne de caractères du fichier non exécutable à l'aide de l'OCR ; de comparer 1) une chaîne de caractères malveillante suspecte liée à la suppression de réglages de sécurité de la macro à 2) la chaîne de caractères extraite ; et d'analyser, en fonction de la mise en correspondance entre la chaîne de caractères malveillante suspecte et la chaîne de caractères extraite, si la macro malveillante est incluse dans le fichier non exécutable.
본 명세서는 서버가 OCR(Optical character recognition)을 이용하여 비실행 파일의 악성 매크로(macro)를 탐지하는 방법에 있어서, 상기 OCR을 이용하여, 상기 비실행 파일의 문자열을 추출하고, 1) 상기 매크로의 보안 설정 해제와 관련된 악성 의심 문자열과 2) 상기 추출된 문자열을 비교하며, 상기 악성 의심 문자열과 상기 추출된 문자열의 매칭에 근거하여, 상기 비실행 파일에 상기 악성 매크로가 포함되어 있는지를 분석할 수 있다. |
---|