Kali: Scalable Encryption Fingerprinting In Dynamic Malware Traces

PROCEEDINGS OF THE 2017 12TH INTERNATIONAL CONFERENCE ON MALICIOUS AND UNWANTED SOFTWARE (MALWARE)(2017)

引用 1|浏览120
暂无评分
摘要
Binary analysis of malware to determine uses of encryption is an important primitive with many critical applications, such as reverse-engineering of malware network communications and decryption of files encrypted by ransomware. The state of the art for encryption fingerprinting in dynamic execution traces, the ALIGOT algorithm-while effective in identifying a range of known ciphers-suffers from significant scalability limitations: in certain cases, even analyzing traces of a few thousands of machine instructions may require prohibitive time/space. In this work, we propose KALI, an enhanced algorithm based on ALIGOT which significantly reduces time/space complexity and increases scalability. Moreover, we propose a technique to focalize the analysis on encryption used for specific purposes, further improving efficiency. Results show that KALI achieves orders of magnitude reduction in execution time and memory utilization compared to ALIGOT, and processes real-world program traces in minutes to hours.
更多
查看译文
关键词
scalable encryption,dynamic malware traces,binary analysis,reverse-engineering,malware network communications,ransomware,encryption fingerprinting,dynamic execution traces,significant scalability limitations,machine instructions,KALI,enhanced algorithm,processes real-world program traces,ALIGOT algorithm,time-space complexity
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要