Title | ||
---|---|---|
Cryptographic Algorithms Analysis Technology Research Based on Functions Signature Recognition |
Abstract | ||
---|---|---|
At present, the research on software reverse engineering pays more attention to cryptographic algorithms recognition and analysis. Malwares are becoming increasingly stealthy, more and more malwares are using cryptographic algorithms to protect themselves from being analyzed. There are no mature theory and tools to analyze cryptographic algorithms from the executable files effectively and exactly. In order to solve the problem efficiently, this paper discusses functions signature recognition technology, creating the cryptographic algorithms library including more than 3000 signature characteristics, and explores a way to recognize cryptographic algorithms based on functions signature recognition. Finally, the experiment results indicate the method is effective and feasible. |
Year | DOI | Venue |
---|---|---|
2014 | 10.1109/CIS.2014.20 | CIS |
Keywords | Field | DocType |
signature library, cryptographic algorithms recognition, minimum perfect Hash function | Key management,Hash-based message authentication code,Signature recognition,Cryptographic protocol,Cryptography,Computer science,Algorithm,Theoretical computer science,Cryptographic primitive,Security of cryptographic hash functions,Executable | Conference |
Citations | PageRank | References |
0 | 0.34 | 4 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Rui Chang | 1 | 389 | 39.86 |
Liehui Jiang | 2 | 15 | 6.94 |
Hui Shu | 3 | 5 | 2.86 |
Hong-qi He | 4 | 2 | 2.20 |