International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 143 | Views: 246

M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 4 Issue 3, March 2015


Analysis of Monitored Binary Execution to Identify Data Modifications and Cryptographic Operations

Stebin Sunny [2] | Anisha Antu


Abstract: Analyzing binary executable is a tedious task in the field of cryptography. In real world internet scenarios all the data is to be encrypted using different cryptographic algorithms for improving security. Malware programs also using this cryptographic techniques to hiding them from being analyzed. We developed a framework to identify the data modifications and to decrypt different types of data even if they are having multi rounded encryption. This mechanism is based on avalanche effect in cryptography that can able to pinpoint exactly where the data modification is happened even nested cryptographic operations is happened and extended to analyze the encryption of files other than documents. Intermediate node analyzing also included to improve the accuracy checking. The same work can be carried out when different types of files having encrypted or multi encrypted with another conditions.


Keywords: Avalanche Effect, Cryptographic Algorithms, Nested Cryptographic Operations, Malwares, Security Attacks


Edition: Volume 4 Issue 3, March 2015,


Pages: 80 - 82


How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top