期刊文献+

一种改进的密码函数识别方法

AN IMPROVED METHOD OF CRYPTOGRAPHIC FUNCTION RECOGNITION
下载PDF
导出
摘要 密码函数识别在恶意代码分析、软件脆弱性分析等领域具有积极的作用。传统的密码函数识别算法由于识别方式单一而存在识别精度不高的问题。针对上述问题,提出一种改进的基于数据流分析的密码函数识别方法,将数据流分析引入密码函数识别中,利用递进式多特征的方法对密码函数进行识别。实验表明,该方法能够准确定位密码函数在应用程序中的位置,相比现有方法提高了密码函数的识别精度。 Cryptographic function recognition has a positive effect in malicious code analysis,software vulnerability analysis and other fields. Traditional cryptographic function recognition algorithm has the problem of low identification accuracy due to its single mode. In light of the above problem,we proposed an improved method of cryptographic function recognition which is based on data flow analysis. It introduces data flow analysis to cryptographic function recognition,and uses progressive multi-feature approach to recognise the cryptographic functions. Experiments showed that the method could accurately locate the position of cryptographic functions in the application,compared to existing methods,the accuracy of cryptographic function recognition was improved.
出处 《计算机应用与软件》 CSCD 2016年第3期299-303,313,共6页 Computer Applications and Software
基金 国家自然科学基金项目(61309007) 国家科技支撑计划项目(2012BAH47B01)
关键词 密码函数识别 常数特征匹配 数据流分析 Cryptographic function recognition Constant feature matching Data flow analysis
  • 相关文献

参考文献7

  • 1Caballero J,Yin H,Liang Z,et al.Polyglot:Automatic extraction of protocol message format using dynamic binary analysis[C]//Proceedings of the 14th ACM conference on Computer and communications security.ACM,2007:317-329.
  • 2Lin Z,Jiang X,Xu D,et al.Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution[C]//NDSS,2008,8:1-15.
  • 3Wang Z,Jiang X,Cui W,et al.Re Format:Automatic reverse engineering of encrypted messages[M]//Computer Security-ESORICS 2009.Springer Berlin Heidelberg,2009:200-215.
  • 4Wondracek G,Comparetti P M,Kruegel C,et al.Automatic Network Protocol Analysis[C]//NDSS,2008,8:1-14.
  • 5Lutz N.Towards revealing attackers intent by automatically decrypting network traffic[J].Master’s Thesis,ETH,Zürich,Switzerland,2008.
  • 6李洋,康绯,舒辉.基于动态二进制分析的密码算法识别[J].计算机工程,2012,38(17):106-109. 被引量:7
  • 7Calvet J,Fernandez J M,Marion J Y.Aligot:Cryptographic function identification in obfuscated binary programs[C]//Proceedings of the2012 ACM conference on Computer and communications security.ACM,2012:169-182.

二级参考文献9

  • 1GrObert F. Automatic Identification of Cryptographic Primitives in Software[D]. Bochum, Germany: Ruhr-University Bochum, 2010.
  • 2Zhao Ruoxu, Gu Dawu, Li Juanru, et al. Detection and Analysis of Cryptographic Data Inside Software[C]//Proc. of ISC'll. Xi'an, China: Is. n.], 2011.
  • 3Caballero J, Heng Yin, Liang Zhenkai, et al. Polyglot: Automatic Extraction of Protocol Message Format Using Dynamic Binary Analysis[C]//Proc. of CCS'07. New York, USA: ACM Press,.2007.
  • 4Lutz N. Towards Revealing Attackers' Intent by Automatically Decrypting Network Traffic[D]. Ztirich, Switzerland: ETH Zttrich, 2008.
  • 5Bruening D L. Efficient, Transparent, and Comprehensive Runtime Code Manipulation[D]. Cambridge, USA: Massachusetts Institute of Technology, 2004.
  • 6Harvey I. Cipher Hunting: How to Find Cryptographic Algorithms In Large Binaries[M]. Cambridge, UK: nCipher Corporation Ltd., 2001.
  • 7Newsome J, Song D. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software[C]//Proc. of NDSS'05. San Diego, USA: [s. n.], 2005.
  • 8Wang Zhi, Jiang Xuxian, Cui Weidong, et al. ReFormat: Automatic Reverse Engineering of Encrypted Messages[D]. Raleigh, USA: NC State University, 2008.
  • 9李继中,蒋烈辉,尹青,刘铁铭,郭佳.基于Bayes决策的密码算法识别技术[J].计算机工程,2008,34(20):159-160. 被引量:9

共引文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部