Analysis of Monitored Binary Execution to Identify Data Modifications and Cryptographic Operations

Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 3

Abstract

Analyzing binary executable is a tedious task in the field of cryptography. In real world internet scenarios all the data is to be encrypted using different cryptographic algorithms for improving security. Malware programs also using this cryptographic techniques to hiding them from being analyzed. We developed a framework to identify the data modifications and to decrypt different types of data even if they are having multi rounded encryption. This mechanism is based on avalanche effect in cryptography that can able to pinpoint exactly where the data modification is happened even nested cryptographic operations is happened and extended to analyze the encryption of files other than documents. Intermediate node analyzing also included to improve the accuracy checking. The same work can be carried out when different types of files having encrypted or multi encrypted with another conditions.

Authors and Affiliations

Keywords

Related Articles

Productivity Analysis of AODV and DSDV Routing Protocols In MANETs

Productivity Analysis of AODV and DSDV Routing Protocols In MANETs

Polarization Effect of Antireflection Coating for SOI Material System

For Silicon on Insulator (SOI) material system light transmission & polarization effect due to antireflection coating is investigated with the aid of CAD tool Essential Macleod & MATLAB. In case of one layer coating the...

Effective Method for Automatic Generation of Knowledge from Electronic Textbook

With the tremendous increase in traffic and tools in virtually every organization we need such kind of tool that will perform all the operation regarding education system in effective way so that technology supported lea...

The Closed and Completely Closed U-BG-Ideals with Respect to Element of a U-BG-BH-Algebra

In this paper, we introduce the notions of closed and completely closed U-BG-ideals with respect to element of a U-BG-BH-algebra, we state and prove some theorems and examples which determine the relationships among th...

Response of Onion (Allium Cepa L.) Growth and Yield to Different Combinations of N, P, S, Zn Fertilizers and Compost in Northern Ethiopia

"Low soil fertility status is a limiting factor in northern Ethiopia in general and the study area in particular. To improve this problem and increase onion yield, balanced fertilization is a key important factor identif...

Download PDF file
  • EP ID EP356799
  • DOI -
  • Views 88
  • Downloads 0

How To Cite

(2015). Analysis of Monitored Binary Execution to Identify Data Modifications and Cryptographic Operations. International Journal of Science and Research (IJSR), 4(3), -. https://europub.co.uk/articles/-A-356799