Content Disarm & Reconstruction
Lupe: A magnifying lens used to inspect objects for the detection of genuine gemstones.
Global IT advisory firm "Gartner" recommends the use of CDR as evasion techniques for malware advance.
CDR (Content Disarm & Reconstruction) is a technology that removes potential threat elements contained in documents without relying on detection and reassembles them into safe files.
It detects tampering by checking the consistency of file extensions and headers.
Identification of over 60 file formats (excluding documents, images, compression, etc.)
It verifies integrity by analyzing the unique characteristics of file formats.
It identifies and recovers file damage.
※ The possibility of recovery varies depending on the degree of file damage.
In 2018, the National Archives used a program to identify and recover damaged records, achieving a 73% recovery rate for damaged files.
In 2019, the National Archives proceeded with the enhancement of the damaged record identification and recovery program, resulting in an improved recovery rate of 85%.
"Study on the Differentiation and Restoration Methods of Damaged Electronic Records," published in February 2019 by the Korea Information Security Society.
It removes potential security vulnerabilities within files that can be exploited by malware (such as malicious macros, scripts, embedded files, etc.) and reconstructs them into clean files.
It supports compression formats including ALZ and EGG, which are not supported by foreign products, as well as ZIP, 7Z, TAR, GZ, XZ, and BZ2.
Lupe can detect and reassemble even if a HWP file is compressed into a ZIP file and then compressed again into a 7Z file. It is capable of handling any mixed form of compression, regardless of the number of steps involved in multi-layer compression.
For Excel, it first determines whether the document is normal or malicious by comparing the malicious code DNA similarity. If it is malicious, then it undergoes Content Disarm and Reconstruction (CDR) processing.
It can be securely integrated into network interconnection solutions, web/email servers, document centralization solutions, etc., enabling safe document transfer. It can be applied anywhere secure document transfer is needed, beyond the examples provided.
This is a list of client companies that have resolved security vulnerabilities in documents by introducing Lupe.