DocumentCode
234910
Title
A Method of Multiple Encryption and Sectional Encryption Protocol Reverse Engineering
Author
Wei Lin ; Jinlong Fei ; Yuefei Zhu ; Xiaolong Shi
Author_Institution
State Key Lab. of Math. Eng. & Adv. Comput., Zhengzhou, China
fYear
2014
fDate
15-16 Nov. 2014
Firstpage
420
Lastpage
424
Abstract
Research on unknown network protocol reverse engineering is of great significance in many network security applications. Currently most of methods are limited in analyzing plain-text protocols, and a few of method can partly analyze the encryption protocol which is powerless for multiple encryption protocol or sectional encryption protocol. This paper proposes a method of encrypted protocol reverse engineering based on dynamic taint analysis. The method uses Pin to record executed instructions, and then conducts off-line analysis of the data dependencies to build two taint propagation graphs on instruction and function level, then recover the decryption process. The decrypted plaintext can be located due to the decryption process feature. And then, the format of protocol can be parsed. Experiments show that the method can accurately locate the decrypted protocol data of the multiple encryption and sectional encryption protocol, and restore the original format.
Keywords
computer network security; cryptographic protocols; reverse engineering; Pin; data dependencies; decryption process feature; dynamic taint analysis; encryption protocol reverse engineering; executed instructions; function level; instruction level; network security applications; offline analysis; plain-text protocols; plaintext decryption process; sectional encryption protocol; taint propagation graphs; unknown network protocol reverse engineering; Encryption; Flow graphs; Memory management; Protocols; Reverse engineering; decryption process recovering Introduction; dynamic taint analysis; encryption protocol reverse engineering; multiple encryption; sectional encryption;
fLanguage
English
Publisher
ieee
Conference_Titel
Computational Intelligence and Security (CIS), 2014 Tenth International Conference on
Conference_Location
Kunming
Print_ISBN
978-1-4799-7433-7
Type
conf
DOI
10.1109/CIS.2014.114
Filename
7016930
Link To Document