• DocumentCode
    595562
  • Title

    CIS: The Crypto Intelligence System for automatic detection and localization of cryptographic functions in current malware

  • Author

    Matenaar, F. ; Wichmann, Arne ; Leder, F. ; Gerhards-Padilla, Elmar

  • Author_Institution
    RWTH Aachen, Aachen, Germany
  • fYear
    2012
  • fDate
    16-18 Oct. 2012
  • Firstpage
    46
  • Lastpage
    53
  • Abstract
    Finding and extracting crypto algorithms in binary code is often a tedious reverse engineering task. A significant amount of manual work is required when unknown implementations are used. This is especially true for malware that contains variants of existing or even completely new algorithms. So far, no flexible and generic crypto detection framework exists that can support analysts in this task. The framework must be able to handle various heuristics that each are ideal to detect specific types of cryptographic algorithms. In addition, a suitable set of heuristics must be selected that can identify a wide range of crypto algorithms from various classes since the type of crypto implemented in a binary is not always known. In this paper, we present the architecture of CIS, the Crypto Intelligence System, that fulfills the requirements for such a framework. Furthermore, we evaluate different heuristics for the real-world usage in the framework. The overall evaluation, using real programs, shows that CIS simplifies the job of an analysts significantly with a high detection and low false positive ratio.
  • Keywords
    cryptography; invasive software; CIS system; crypto detection framework; cryptographic algorithm; cryptographic function detection; cryptographic function localization; reverse engineering task; Algorithm design and analysis; Cryptography; Entropy; Heuristic algorithms; Instruments; Malware; Runtime;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Malicious and Unwanted Software (MALWARE), 2012 7th International Conference on
  • Conference_Location
    Fajardo, PR
  • Print_ISBN
    978-1-4673-4880-5
  • Type

    conf

  • DOI
    10.1109/MALWARE.2012.6461007
  • Filename
    6461007