ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAE.IT-X.1218 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2022-06-29 ÃÑ ÆäÀÌÁö 21
ÇÑ±Û Ç¥ÁØ¸í »÷µå¹Ú½º ȯ°æ¿¡¼­ µ¿Àû ¾Ç¼ºÄÚµå ºÐ¼®ÀÇ ¿ä±¸»çÇ× ¹× Áöħ
¿µ¹® Ç¥Áظí Requirements and Guidelines for Dynamic Malware Analysis in a Sandbox Environment
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº »÷µå¹Ú½º ȯ°æ¿¡¼­ ¾Ç¼ºÄÚµå ŽÁö ¹× ¾Ç¼ºÄÚµå µ¿Àû ºÐ¼®À» À§ÇÏ¿© º¸¾ÈÀ§Çù ½Ã³ª¸®¿À(7Á¾ÀÇ °ø°Ý ½Ã³ª¸®¿À), »÷µå¹Ú½º ±â¼ú Á¤ÀÇ, »÷µå¹Ú½º È°¿ëÀ» À§ÇÑ ¿ä±¸»çÇ× 6°Ç¿¡ ´ëÇÑ Áöħ, ¾Ç¼ºÄÚµå µ¿Àû ÇàÀ§ºÐ¼®À» À§ÇÑ ÀϹÝÀûÀÎ ¿ä±¸»çÇ× 7°Ç°ú Áöħ¿¡ ´ëÇÏ¿© ¼³¸íÇÏ°í ÀÖ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard describes the security threat scenarios (7 types of attack scenarios), the definition of sandbox technology, the guidelines for six requirements for sandbox use, and dynamic malware analysis in a sandbox environment. In addition, seven general requirements and guidelines for behavior analysis are described.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAE.IT-X.1218.pdf TTAE.IT-X.1218.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
»÷µå¹Ú½º ȯ°æ¿¡¼­ µ¿Àû ¾Ç¼ºÄÚµå ºÐ¼®ÀÇ ¿ä±¸»çÇ× ¹× Áöħ TTAE.IT-X.1218 2022-06-29 Á¦Á¤ À¯È¿ ¾øÀ½ TTAE.IT-X.1218.pdf