International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 143

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015


Analysis of Monitored Binary Execution to Identify Data Modifications and Cryptographic Operations

Stebin Sunny [2] | Anisha Antu


Abstract: Analyzing binary executable is a tedious task in the field of cryptography. In real world internet scenarios all the data is to be encrypted using different cryptographic algorithms for improving security. Malware programs also using this cryptographic techniques to hiding them from being analyzed. We developed a framework to identify the data modifications and to decrypt different types of data even if they are having multi rounded encryption. This mechanism is based on avalanche effect in cryptography that can able to pinpoint exactly where the data modification is happened even nested cryptographic operations is happened and extended to analyze the encryption of files other than documents. Intermediate node analyzing also included to improve the accuracy checking. The same work can be carried out when different types of files having encrypted or multi encrypted with another conditions.


Keywords: Avalanche Effect, Cryptographic Algorithms, Nested Cryptographic Operations, Malwares, Security Attacks


Edition: Volume 4 Issue 3, March 2015,


Pages: 80 - 82


How to Download this Article?

You Need to Register Your Email Address Before You Can Download the Article PDF


How to Cite this Article?

Stebin Sunny, Anisha Antu, "Analysis of Monitored Binary Execution to Identify Data Modifications and Cryptographic Operations", International Journal of Science and Research (IJSR), Volume 4 Issue 3, March 2015, pp. 80-82, https://www.ijsr.net/get_abstract.php?paper_id=SUB151867

Similar Articles with Keyword 'Cryptographic Algorithms'

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena [3] | A. Komathi [2]

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1087 - 1091

Comparative Analysis of Cryptographic Algorithms for Storing Shared Data on the Cloud

Kavitha K [10] | Manjula R [2]

Share this Article
Top