Digital Library


Search: "[ keyword: API ]" (25)
    De-Obfuscated Scheme for Obfuscation Techniques Based on Trampoline Code
    , , , Vol. 33, No. 6, pp. 1043-1053, Dec. 2023
    JKIISC.2023.33.6.1043

    , , Vol. 32, No. 4, pp. 629-635, Aug. 2022
    10.13089/JKIISC.2022.32.4.629

    , , Vol. 32, No. 3, pp. 575-590, Jun. 2022
    10.13089/JKIISC.2022.32.3.575

    , , Vol. 31, No. 4, pp. 605-616, Aug. 2021
    10.13089/JKIISC.2021.31.4.605

    A Study on the Analysis Method to API Wrapping that Difficult to Normalize in the Latest Version of Themida
    이재휘, 이병희, 조상현, Vol. 29, No. 6, pp. 1375-1382, Dec. 2019
    10.13089/JKIISC.2019.29.6.1375
    Keywords: Themida, API wrapping, Unpacking, Themida, API wrapping, Unpacking

    A Study on the Policy Proposal and Model B2B2C for Safe Open Banking
    최대현, 김인석, Vol. 29, No. 6, pp. 1271-1283, Dec. 2019
    10.13089/JKIISC.2019.29.6.1271
    Keywords: B2B2C, open banking, Open API, OAuth, B2B2C, open banking, Open API, OAuth

    API Grouping Based Flow Analysis and Frequency Analysis Technique for Android Malware Classification
    심현석, 박정수, 단티엔북, 정수환, Vol. 29, No. 6, pp. 1235-1242, Dec. 2019
    10.13089/JKIISC.2019.29.6.1235
    Keywords: Android Malware, Malware classification, Feature selection, API grouping, flow analysis, Android Malware, Malware classification, Feature selection, API grouping, flow analysis

    Multi-Modal Based Malware Similarity Estimation Method
    유정도, 김태규, 김인성, 김휘강, Vol. 29, No. 2, pp. 347-363, Mar. 2019
    10.13089/JKIISC.2019.29.2.347
    Keywords: similarity, Malware analysis, API call sequence, Nilsimsa, Jaccard, TF-IDF, similarity, Malware analysis, API call sequence, Nilsimsa, Jaccard, TF-IDF

    S.O.S : Shield of Steam Protection Based on API Call Birthmark in Online Game ESD DRM
    오동빈, 김휘강, Vol. 28, No. 6, pp. 1297-1307, Nov. 2018
    10.13089/JKIISC.2018.28.6.1297
    Keywords: Steam, Game ESD, Online game security, API Call birthmark, Steam, Game ESD, Online game security, API Call birthmark

    A Study on Malware Clustering Technique Using API Call Sequence and Locality Sensitive Hashing
    Dong Woo Goh, Huy Kang Kim, Vol. 27, No. 1, pp. 91-102, Feb. 2017
    10.13089/JKIISC.2017.27.1.91
    Keywords: API call sequence, Malware analysis, clustering, Dynamic Analysis