期刊文献+

ARIA加密算法的识别规则提取和检测

Identification Rules Extraction and Detection of ARIA Encryption Algorithm
下载PDF
导出
摘要 目前很多恶意软件都会使用各种加密算法来隐藏其病毒特性,针对恶意代码样本中使用的ARIA加密算法,通过对加密算法源码和二进制文件的分析,从密钥盒、应用程序编程接口函数、初始化数据、字符串以及指令流等不同维度来提取ARIA加密算法的特征,构造出算法识别的YARA规则。经测试验证表明,提取规则可以帮助网络安全分析人员准确识别恶意样本和可疑程序中是否使用ARIA加密算法来隐匿特征。 Nowdays,many malicious softwares use various encryption algorithms to conceal their virus characteristics.The ARIA encryption algorithm used in malicious code samples is proposed.By analyzing the source code and binary file of the ARIA encryption algorithm,the characteristics of the algorithm are extracted from different dimensions such as key box,application programming interface function,initialization data,character string,and instruction stream and the YARA rules are constructed to recognize the ARIA encryption algorithm.Tests show that the extracted rules can help network security analysts accurately identify whether the ARIA encryption algorithm is used to hide features in malicious samples and suspicious programs.
作者 杨阳 奥昱杰 彭泽康 曾浩 翟继强 YANG Yang;AO Yujie;PENG Zekang;ZENG Hao;ZHAI Jiqiang(School of Computer Science and Technology,Harbin University of Science and Technology,Harbin 150080,China)
出处 《计算机与网络》 2024年第4期371-376,共6页 Computer & Network
基金 2022年度黑龙江省高等教育教学改革研究重点委托项目(SJGZ20220086) 2023年黑龙江省高等教育学会教育科研课题(23GJYBB080) 2022年哈尔滨理工大学教育教学改革项目(220210006) 2024年国家级大学生创新创业训练计划项目。
关键词 恶意软件 算法识别 ARIA YARA规则 malware algorithm identification ARIA YARA rule
  • 相关文献

参考文献5

二级参考文献26

  • 1吴文玲,张文涛,冯登国.Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia[J].Journal of Computer Science & Technology,2007,22(3):449-456. 被引量:21
  • 2C. Alias. Program Optimization by Template Recognition and Replacement[D]. University of Versailles Saint-Quentin. 2005.
  • 3Robert Metzger. Automatic Algorithm Recognition and Replacement[D].MIT.2003.
  • 4GrObert F. Automatic Identification of Cryptographic Primitives in Software[D]. Bochum, Germany: Ruhr-University Bochum, 2010.
  • 5Zhao Ruoxu, Gu Dawu, Li Juanru, et al. Detection and Analysis of Cryptographic Data Inside Software[C]//Proc. of ISC'll. Xi'an, China: Is. n.], 2011.
  • 6Caballero J, Heng Yin, Liang Zhenkai, et al. Polyglot: Automatic Extraction of Protocol Message Format Using Dynamic Binary Analysis[C]//Proc. of CCS'07. New York, USA: ACM Press,.2007.
  • 7Lutz N. Towards Revealing Attackers' Intent by Automatically Decrypting Network Traffic[D]. Ztirich, Switzerland: ETH Zttrich, 2008.
  • 8Bruening D L. Efficient, Transparent, and Comprehensive Runtime Code Manipulation[D]. Cambridge, USA: Massachusetts Institute of Technology, 2004.
  • 9Harvey I. Cipher Hunting: How to Find Cryptographic Algorithms In Large Binaries[M]. Cambridge, UK: nCipher Corporation Ltd., 2001.
  • 10Newsome J, Song D. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software[C]//Proc. of NDSS'05. San Diego, USA: [s. n.], 2005.

共引文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部