Symmetric-Key Cryptographic Routine Detection in Anti-Reverse Engineered Binaries Using Hardware Tracing
Software uses cryptography to provide confidentiality in communication and to provide authentication. Additionally, cryptographic algorithms can be used to protect software against cracking core algorithms in software implementation. Recently, malware and ransomware have begun to use encryption to p...
Main Authors: | Juhyun Park, Yongsu Park |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2020-06-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/9/6/957 |
Similar Items
-
A Neural Network-Based Approach for Cryptographic Function Detection in Malware
by: Li Jia, et al.
Published: (2020-01-01) -
Implementation and characterization of flash-based hardware security primitives for cryptographic key generation
by: Mi-Kyung Oh, et al.
Published: (2023-04-01) -
Key security detection based on dynamic binary instrumentation
by: Hao LIN,Fei KANG,Yan GUANG
Published: (2017-11-01) -
Towards Dynamic and Partial Reconfigurable Hardware Architectures for Cryptographic Algorithms on Embedded Devices
by: Arkan Alkamil, et al.
Published: (2020-01-01) -
Requirements for symmetric block encryption algorithms developed for software and hardware implementation
by: Kairat Sakanuly Sakan, et al.
Published: (2021-12-01)