Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition
At present, the research on software reverse engineering pays more attention to cryptographic algorithms recognition and analysis. Malwares are becoming increasingly stealthy, more and more malwares are using cryptographic algorithms to protect themselves from being analyzed. There are no mature the...
Saved in:
Published in | 2014 Tenth International Conference on Computational Intelligence and Security pp. 499 - 504 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.11.2014
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | At present, the research on software reverse engineering pays more attention to cryptographic algorithms recognition and analysis. Malwares are becoming increasingly stealthy, more and more malwares are using cryptographic algorithms to protect themselves from being analyzed. There are no mature theory and tools to analyze cryptographic algorithms from the executable files effectively and exactly. In order to solve the problem efficiently, this paper discusses functions signature recognition technology, creating the cryptographic algorithms library including more than 3000 signature characteristics, and explores a way to recognize cryptographic algorithms based on functions signature recognition. Finally, the experiment results indicate the method is effective and feasible. |
---|---|
DOI: | 10.1109/CIS.2014.20 |