Analysis of Monitored Binary Execution to Identify Data Modifications and Cryptographic Operations
Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 3)Publication Date: 2015-03-05
Authors : Stebin Sunny; Anisha Antu;
Page : 80-82
Keywords : Avalanche Effect; Cryptographic Algorithms; Nested Cryptographic Operations; Malwares; Security Attacks;
Abstract
Analyzing binary executable is a tedious task in the field of cryptography. In real world internet scenarios all the data is to be encrypted using different cryptographic algorithms for improving security. Malware programs also using this cryptographic techniques to hiding them from being analyzed. We developed a framework to identify the data modifications and to decrypt different types of data even if they are having multi rounded encryption. This mechanism is based on avalanche effect in cryptography that can able to pinpoint exactly where the data modification is happened even nested cryptographic operations is happened and extended to analyze the encryption of files other than documents. Intermediate node analyzing also included to improve the accuracy checking. The same work can be carried out when different types of files having encrypted or multi encrypted with another conditions.
Other Latest Articles
- Exploring the Causality Relationship between Manufactures Exports and CO2 Emissions: An Evidence from India Empirical Estimates
- Densification of W-brass Composites by Infiltration
- Quality of Life for Children Suffering from Diabetes Mellitus
- In vitro Shoot Multiplication of Medicinally Important Caralluma stalagmifera Fischer
- Alcohol Consumption among Undergraduate MBBS Students in Rims, Imphal
Last modified: 2021-06-30 21:34:49