期刊文献+

基于动态循环信息熵的密码函数筛选技术 被引量:3

Technique of cryptographic function filtration based on dynamic loop information entropy
下载PDF
导出
摘要 二进制代码中的密码算法识别与筛选对于恶意软件分析、密码算法应用安全性验证有着重要意义。分析了密码函数代码实现中内存数据操作特征和基本块循环结构特征,根据二进制数据的信息熵理论,实验验证了密码算法内存操作数据的高熵值特性,构建了基于动态循环信息熵的密码函数筛选模型,并采用动静结合的方法重构基本块循环中的动态读写内存数据。测试结果表明了筛选模型的可靠性和准确性。 For malware analysis and cipher application security validating,identification and filtration of cryptographic function from binary code has great significance.The memory operation and basic block loop characters were analyzed from cryptographic functions.According to the theory of binary data's information entropy,the characteristic of high-entropy of cryptographic algorithms was verified,a cryptographic functions filtration model was constructed based on dynamic loop entropy,and the hybrid (dynamic and static) method was adopted to reconstruct dynamic memory data in basic block loop.The experimental result shows that the filtration model has reliability and veracity.
出处 《计算机应用》 CSCD 北大核心 2014年第4期1025-1028,1033,共5页 journal of Computer Applications
基金 国家自然科学基金资助项目(61272489)
关键词 密码函数 基本块循环 信息熵 动态插桩 内存数据重构 cryptographic function basic block loop information entropy dynamic instrumentation memory data reconstruction
  • 相关文献

参考文献14

  • 1BRUCES.应用密码挚(协议、算法与C源程序)[M].2版.吴世忠,祝世雄,张文政,拿译.北京:机械工业出版社,2000.
  • 2FILIOL E. Malicious cryptography techniques for unreversable ( ma- licious or not) binaries [ C]// H2HC'10: Proceedings of the 2010 Hacker to Hacker Conference. New York: ACM, 2010.
  • 3HARVEY I. Cipher hunting: how to find cryptographic algorithms in large binaries [ M]. Cambridge: nCipher Corporation Ltd, 2001.
  • 4WRIGHT J L, MANIC M. Neural network approach to locating cryp- tography in object code [ C]// ETFA 2009: Proceedings of the 2009 IEEE Conference on Emerging Technologies & Factory Automation. Piscataway: IEEE, 2009:1-4.
  • 5LEDER F, MARTINI P, WICHMANN A. Finding and extracting crypto routines from malware [ C]// Proceedings of the 2009 IEEE 28th International Performance Computing and Communications Conference. Piscataway: IEEE, 2009:394-401.
  • 6LUTZ N. Towards revealing attackers' intent by automatically de- crypting network traffic [ D]. Ztirich, Switzerland: ETH Zurich, 2008.
  • 7WANG Z, JIANG X, CUI W, et al. ReFormat: automatic reverse engineering of encrypted messages [ C]// ESORICS '09: Proceed- ings of the 14th European Conference on Research in Computer Se- curity, LNCS 5789. Berlin: Spring, 2009:200-215.
  • 8ZHAO R, GU D, LI J, et al. Detection and analysis of cryptograph- ic data inside software [ C]/! ISC'I 1: Proceeding of the 14th Inter- national Conference on Information Security, LNCS 7001. Berlin: Springer, 2011:182 - 196.
  • 9CALVET J, FERNANDEZ J M, MARION J-Y. Aligot: crypto- graphic function identification in obfuscated binary programs [ C]// CCS '12: Proceedings of the 2012 ACM Conference on Computerand Communication Security. New York: ACM, 2012:169 - 182.
  • 10LYDA R, HAMROCK J. Using entropy analysis to find encrypted and packed malware [ J]. IEEE Security & Privacy, 2007, 5(2): 40 - 45.

同被引文献22

  • 1Pooja M.Classification of Ciphers[D].Department ofComputer Science and Engineering,Indian Institute of Technology,2001.
  • 2Girish C.Classication of Modern Ciphers[D].Department of Computer Science and Engineering,Indian Institute of Technology,2002.
  • 3MBrahmaji M.Classication of RSA and Idea Ciphers[D]. Department of Computer Science and Engineering, Indian Institute of Technology,2003.
  • 4Saxena G.Classication of Ciphers Using Machine Learning[D].Department of Computer Science and Engineering,Indian Institute of Technology,2008.
  • 5Soni A.Learning Encryption Algorithms from Ciphertext[R].BTP report,Department of Computer Science and Engineering,Indian Institute of Technology.
  • 6Mishra S,Bhattacharjya A.Pattem Analysis of Cipher Text:A Combined Approach[C],2013 International Conference on Recent Trends in Information Technology:393-398.
  • 7Tortes R,Oliveira G,Xex o J,et al.Identification of Keys and Cryptographic Algorithms Using Genetic Algorithm and Graph Theory[J].IEEE LATIN AMERICA TRANSACTIO NS,2011,9(02): 178-183.
  • 8Souza W,Carvalho L,Xex 6 o J.Identification of N Block Ciphers[J].IEEE LATIN AMERICA TRANSACTIO NS,2011,9(02): 184-191.
  • 9Lomte V,Shinde A.Review of a New Distinguishing Attack Using Block Cipher with a Neural Network[J].Intemational Journal of Science and Research,2014,3(08):733-736.
  • 10李继中,蒋烈辉,尹青,刘铁铭,郭佳.基于Bayes决策的密码算法识别技术[J].计算机工程,2008,34(20):159-160. 被引量:9

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部