EXPOSING TRANSIENT SECRETS AND DETECTING MALWARE VARIANTS USING CONTROL AND DATA FLOW ANALYSIS
Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.5, No. 12)Publication Date: 2014-12-29
Authors : ANJU S; SHEEMA M; P.JAYAKUMAR; S.SASIDHAR BABU;
Page : 31-36
Keywords : computer engineering; iaeme journals; iaeme publication; research; IJCET; research article; research paper; open access journals; international journals publisher; journal impact factor;
Abstract
Malware is one of the major threats faced by distributed computing system. Malware authors use cryptographic algorithms to protect themselves from being analyze d. The use of cryptographic algorithms and transient secrets inside the malware binary provides a key obstacle to effective malware analysis and defense. CipherXRay?a novel binary analysis framework that can automatically identify and recover the cryptographic operations and transient secrets from the execution of potentially obfuscated binary exec utables. CipherXRay is based on the avalanche effect of cryptographic functions which is able to accurately pinpoint the boundary of cryptographic operation and recover tru ly transient cryptographic secrets that only exist in memory for one instant in between multiple nested cryptographic operations.
Other Latest Articles
- INTEGRATED HONEYPOT
- A SURVEY ON WEIGHTED CLUSTERING TECHNIQUES IN MANETS
- A SECURE ALERT MESSAGING FOR VEHICULAR AD HOC NETWORKS
- Language portfolio of foreign language teacher as means of self-regulation of professional growth
- Improving the research culture of history teacher: theoretical and methodological aspects
Last modified: 2016-08-05 15:53:59