Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition

At present, the research on software reverse engineering pays more attention to cryptographic algorithms recognition and analysis. Malwares are becoming increasingly stealthy, more and more malwares are using cryptographic algorithms to protect themselves from being analyzed. There are no mature the...

Full description

Saved in:
Bibliographic Details
Published in2014 Tenth International Conference on Computational Intelligence and Security pp. 499 - 504
Main Authors Rui Chang, Liehui Jiang, Hui Shu, Hongqi He
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.11.2014
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:At present, the research on software reverse engineering pays more attention to cryptographic algorithms recognition and analysis. Malwares are becoming increasingly stealthy, more and more malwares are using cryptographic algorithms to protect themselves from being analyzed. There are no mature theory and tools to analyze cryptographic algorithms from the executable files effectively and exactly. In order to solve the problem efficiently, this paper discusses functions signature recognition technology, creating the cryptographic algorithms library including more than 3000 signature characteristics, and explores a way to recognize cryptographic algorithms based on functions signature recognition. Finally, the experiment results indicate the method is effective and feasible.
DOI:10.1109/CIS.2014.20