ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

EXPOSING TRANSIENT SECRETS AND DETECTING MALWARE VARIANTS USING CONTROL AND DATA FLOW ANALYSIS

Journal: International Journal of Computer Engineering and Technology (IJCET) (Vol.5, No. 12)

Publication Date:

Authors : ; ; ; ;

Page : 31-36

Keywords : computer engineering; iaeme journals; iaeme publication; research; IJCET; research article; research paper; open access journals; international journals publisher; journal impact factor;

Source : Download Find it from : Google Scholarexternal

Abstract

Malware is one of the major threats faced by distributed computing system. Malware authors use cryptographic algorithms to protect themselves from being analyze d. The use of cryptographic algorithms and transient secrets inside the malware binary provides a key obstacle to effective malware analysis and defense. CipherXRay?a novel binary analysis framework that can automatically identify and recover the cryptographic operations and transient secrets from the execution of potentially obfuscated binary exec utables. CipherXRay is based on the avalanche effect of cryptographic functions which is able to accurately pinpoint the boundary of cryptographic operation and recover tru ly transient cryptographic secrets that only exist in memory for one instant in between multiple nested cryptographic operations.

Last modified: 2016-08-05 15:53:59