메뉴 건너뛰기




Volumn , Issue , 2012, Pages 169-182

Aligot: Cryptographic function identification in obfuscated binary programs

Author keywords

Binary program analysis; Cryptography; Malware

Indexed keywords

ASYMMETRIC CIPHERS; BASIC OPERATION; BINARY PROGRAMS; COMMERCIAL GRADE; CRYPTOGRAPHIC FUNCTIONS; CRYPTOGRAPHIC IMPLEMENTATION; CRYPTOGRAPHIC PRIMITIVES; EXPERIMENTAL EVALUATION; IDENTIFICATION TOOLS; INPUT-OUTPUT; INTEGRAL PART; MALWARE ANALYSIS; MALWARES; STATIC FEATURES;

EID: 84869451078     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2382196.2382217     Document Type: Conference Paper
Times cited : (75)

References (37)
  • 1
    • 84870636714 scopus 로고    scopus 로고
    • AsProtect packer. http://www.aspack.com/asprotect.html.
  • 2
    • 84870633312 scopus 로고    scopus 로고
    • Polar SSL library Web site. http://polarssl.org.
  • 5
    • 84870652419 scopus 로고    scopus 로고
    • F. Boldewin. Peacomm.c Cracking the nutshell. http://www.reconstructer. org/papers/Peacomm.C-Crackingthenutshell.zip.
    • Boldewin, F.1
  • 12
    • 84870650462 scopus 로고    scopus 로고
    • S. Henson et al. OpenSSL library.http://openssl.org.
    • Henson, S.1
  • 14
    • 0021377678 scopus 로고
    • Dynamic characteristics of loops
    • M. Kobayashi. Dynamic characteristics of loops. IEEE Trans. on Computers, 100(2):125-132, 1984.
    • (1984) IEEE Trans. on Computers , vol.100 , Issue.2 , pp. 125-132
    • Kobayashi, M.1
  • 19
    • 68649097821 scopus 로고    scopus 로고
    • The persistence of memory: Forensic identification and extraction of cryptographic keys
    • C. Maartmann-Moe, S. Thorkildsen, and A. Arnes. The persistence of memory: Forensic identification and extraction of cryptographic keys. Digital Investigation, 6:S132-S140, 2009.
    • (2009) Digital Investigation , vol.6
    • Maartmann-Moe, C.1    Thorkildsen, S.2    Arnes, A.3
  • 20
    • 84966243285 scopus 로고
    • Modular multiplication without trial division
    • P. Montgomery. Modular multiplication without trial division. Mathematics of Computation, 44(170):519-521, 1985.
    • (1985) Mathematics of Computation , vol.44 , Issue.170 , pp. 519-521
    • Montgomery, P.1
  • 21
    • 80053629393 scopus 로고    scopus 로고
    • Useful and useless statistics about viruses and anti-virus programs
    • M. Morgenstern and H. Pilz. Useful and useless statistics about viruses and anti-virus programs. In Proc. CARO Workshop, 2010.
    • (2010) Proc. CARO Workshop
    • Morgenstern, M.1    Pilz, H.2
  • 22
    • 84870628090 scopus 로고    scopus 로고
    • L. O Murchu. Trojan.silentbanker decryption. http://www.symantec.com/ connect/blogs/trojansilentbanker-decryption.
    • Murchu, L.O.1
  • 24
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Comm. of the ACM, 21(2):120-126, 1978.
    • (1978) Comm. of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 25
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28(4):656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 26
    • 80052735307 scopus 로고    scopus 로고
    • Inside the storm: Protocols and encryption of the Storm botnet
    • N. Stewart. Inside the storm: Protocols and encryption of the Storm botnet. In Black Hat Technical Security Conference, 2008.
    • (2008) Black Hat Technical Security Conference
    • Stewart, N.1
  • 29
    • 84870634585 scopus 로고    scopus 로고
    • VeriSign. Silentbanker analysis. http://www.verisign.com/static/043671. pdf.
    • Silentbanker Analysis
  • 30
    • 84870639392 scopus 로고    scopus 로고
    • Russian TEA assembly code
    • Russian TEA assembly code. http://www.xakep.ru/post/22086/default.asp.
  • 32
    • 70350399651 scopus 로고    scopus 로고
    • ReFormat: Automatic reverse engineering of encrypted messages
    • Z. Wang, X. Jiang, W. Cui, X. Wang, and M. Grace. ReFormat: Automatic reverse engineering of encrypted messages. In Proc. ESORICS, pages 200-215, 2009.
    • (2009) Proc. ESORICS , pp. 200-215
    • Wang, Z.1    Jiang, X.2    Cui, W.3    Wang, X.4    Grace, M.5
  • 34
    • 84870642966 scopus 로고    scopus 로고
    • RC4 source code. http://cypherpunks.venona.com/date/1994/09/msg00304. html.
    • RC4 Source Code
  • 37
    • 80054815331 scopus 로고    scopus 로고
    • Detection and analysis of cryptographic data inside software
    • R. Zhao, D. Gu, J. Li, and R. Yu. Detection and analysis of cryptographic data inside software. Information Security, pages 182-196, 2011.
    • (2011) Information Security , pp. 182-196
    • Zhao, R.1    Gu, D.2    Li, J.3    Yu, R.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.