Malicious cryptography techniques for unreversable (malicious or not) binaries

Computer Science – Cryptography and Security

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

17 pages, 2 figures, accepted for presentation at H2HC'10

Scientific paper

Fighting against computer malware require a mandatory step of reverse engineering. As soon as the code has been disassemblied/decompiled (including a dynamic analysis step), there is a hope to understand what the malware actually does and to implement a detection mean. This also applies to protection of software whenever one wishes to analyze them. In this paper, we show how to amour code in such a way that reserse engineering techniques (static and dymanic) are absolutely impossible by combining malicious cryptography techniques developped in our laboratory and new types of programming (k-ary codes). Suitable encryption algorithms combined with new cryptanalytic approaches to ease the protection of (malicious or not) binaries, enable to provide both total code armouring and large scale polymorphic features at the same time. A simple 400 Kb of executable code enables to produce a binary code and around $2^{140}$ mutated forms natively while going far beyond the old concept of decryptor.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Malicious cryptography techniques for unreversable (malicious or not) binaries does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Malicious cryptography techniques for unreversable (malicious or not) binaries, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Malicious cryptography techniques for unreversable (malicious or not) binaries will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-697180

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.