International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 143 | Views: 389

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015 | Popularity: 6.2 / 10


     

Analysis of Monitored Binary Execution to Identify Data Modifications and Cryptographic Operations

Stebin Sunny, Anisha Antu


Abstract: Analyzing binary executable is a tedious task in the field of cryptography. In real world internet scenarios all the data is to be encrypted using different cryptographic algorithms for improving security. Malware programs also using this cryptographic techniques to hiding them from being analyzed. We developed a framework to identify the data modifications and to decrypt different types of data even if they are having multi rounded encryption. This mechanism is based on avalanche effect in cryptography that can able to pinpoint exactly where the data modification is happened even nested cryptographic operations is happened and extended to analyze the encryption of files other than documents. Intermediate node analyzing also included to improve the accuracy checking. The same work can be carried out when different types of files having encrypted or multi encrypted with another conditions.


Keywords: Avalanche Effect, Cryptographic Algorithms, Nested Cryptographic Operations, Malwares, Security Attacks


Edition: Volume 4 Issue 3, March 2015


Pages: 80 - 82



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Stebin Sunny, Anisha Antu, "Analysis of Monitored Binary Execution to Identify Data Modifications and Cryptographic Operations", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 80-82, https://www.ijsr.net/getabstract.php?paperid=SUB151867, DOI: https://www.doi.org/10.21275/SUB151867

Similar Articles

Downloads: 2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this Article

Downloads: 102

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2203 - 2208

Review on MANETs Characteristics, Challenges, Application and Security Attacks

Anuj Rana, Sandeep Gupta

Share this Article

Downloads: 103

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1565 - 1567

A Region Boundaries Algorithm for Ear Authentication Based on Plots

G. Harsha Vardhan, K. Jeeva

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016

Pages: 1885 - 1890

A Proposed Paper for D-Scrabble Physical Layer Security Model Integrated with AI

Devansh Dave

Share this Article

Downloads: 104

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 590 - 595

Defending Against Resource Depletion Attacks in Wireless Sensor Networks

Cauvery Raju

Share this Article



Top