DocumentCode
595562
Title
CIS: The Crypto Intelligence System for automatic detection and localization of cryptographic functions in current malware
Author
Matenaar, F. ; Wichmann, Arne ; Leder, F. ; Gerhards-Padilla, Elmar
Author_Institution
RWTH Aachen, Aachen, Germany
fYear
2012
fDate
16-18 Oct. 2012
Firstpage
46
Lastpage
53
Abstract
Finding and extracting crypto algorithms in binary code is often a tedious reverse engineering task. A significant amount of manual work is required when unknown implementations are used. This is especially true for malware that contains variants of existing or even completely new algorithms. So far, no flexible and generic crypto detection framework exists that can support analysts in this task. The framework must be able to handle various heuristics that each are ideal to detect specific types of cryptographic algorithms. In addition, a suitable set of heuristics must be selected that can identify a wide range of crypto algorithms from various classes since the type of crypto implemented in a binary is not always known. In this paper, we present the architecture of CIS, the Crypto Intelligence System, that fulfills the requirements for such a framework. Furthermore, we evaluate different heuristics for the real-world usage in the framework. The overall evaluation, using real programs, shows that CIS simplifies the job of an analysts significantly with a high detection and low false positive ratio.
Keywords
cryptography; invasive software; CIS system; crypto detection framework; cryptographic algorithm; cryptographic function detection; cryptographic function localization; reverse engineering task; Algorithm design and analysis; Cryptography; Entropy; Heuristic algorithms; Instruments; Malware; Runtime;
fLanguage
English
Publisher
ieee
Conference_Titel
Malicious and Unwanted Software (MALWARE), 2012 7th International Conference on
Conference_Location
Fajardo, PR
Print_ISBN
978-1-4673-4880-5
Type
conf
DOI
10.1109/MALWARE.2012.6461007
Filename
6461007
Link To Document