ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Analysis of Monitored Binary Execution to Identify Data Modifications and Cryptographic Operations

Journal: International Journal of Science and Research (IJSR) (Vol.4, No. 3)

Publication Date:

Authors : ; ;

Page : 80-82

Keywords : Avalanche Effect; Cryptographic Algorithms; Nested Cryptographic Operations; Malwares; Security Attacks;

Source : Downloadexternal Find it from : Google Scholarexternal


Analyzing binary executable is a tedious task in the field of cryptography. In real world internet scenarios all the data is to be encrypted using different cryptographic algorithms for improving security. Malware programs also using this cryptographic techniques to hiding them from being analyzed. We developed a framework to identify the data modifications and to decrypt different types of data even if they are having multi rounded encryption. This mechanism is based on avalanche effect in cryptography that can able to pinpoint exactly where the data modification is happened even nested cryptographic operations is happened and extended to analyze the encryption of files other than documents. Intermediate node analyzing also included to improve the accuracy checking. The same work can be carried out when different types of files having encrypted or multi encrypted with another conditions.

Last modified: 2021-06-30 21:34:49