Downloads: 143 | Views: 389
M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015 | Popularity: 6.2 / 10
Analysis of Monitored Binary Execution to Identify Data Modifications and Cryptographic Operations
Stebin Sunny, Anisha Antu
Abstract: Analyzing binary executable is a tedious task in the field of cryptography. In real world internet scenarios all the data is to be encrypted using different cryptographic algorithms for improving security. Malware programs also using this cryptographic techniques to hiding them from being analyzed. We developed a framework to identify the data modifications and to decrypt different types of data even if they are having multi rounded encryption. This mechanism is based on avalanche effect in cryptography that can able to pinpoint exactly where the data modification is happened even nested cryptographic operations is happened and extended to analyze the encryption of files other than documents. Intermediate node analyzing also included to improve the accuracy checking. The same work can be carried out when different types of files having encrypted or multi encrypted with another conditions.
Keywords: Avalanche Effect, Cryptographic Algorithms, Nested Cryptographic Operations, Malwares, Security Attacks
Edition: Volume 4 Issue 3, March 2015
Pages: 80 - 82
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 2
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2786 - 2790Survey: Detection Schemes Against Selective Forwarding Attack
Harpal Singh, Vaibhav Pandey
Downloads: 102
Review Papers, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2203 - 2208Review on MANETs Characteristics, Challenges, Application and Security Attacks
Anuj Rana, Sandeep Gupta
Downloads: 103
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015
Pages: 1565 - 1567A Region Boundaries Algorithm for Ear Authentication Based on Plots
G. Harsha Vardhan, K. Jeeva
Downloads: 103
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 3, March 2016
Pages: 1885 - 1890A Proposed Paper for D-Scrabble Physical Layer Security Model Integrated with AI
Devansh Dave
Downloads: 104
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014
Pages: 590 - 595Defending Against Resource Depletion Attacks in Wireless Sensor Networks
Cauvery Raju