咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献
  • 1 篇 学位论文
  • 1 篇 会议

馆藏范围

  • 4 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3 篇 工学
    • 3 篇 计算机科学与技术...
    • 1 篇 电气工程
    • 1 篇 信息与通信工程
    • 1 篇 软件工程

主题

  • 4 篇 cryptographic fu...
  • 1 篇 function embeddi...
  • 1 篇 device security
  • 1 篇 fuse
  • 1 篇 obfuscated binar...
  • 1 篇 software obfusca...
  • 1 篇 binary code anal...
  • 1 篇 symbolic executi...
  • 1 篇 ransomware
  • 1 篇 neural network
  • 1 篇 entropy
  • 1 篇 binary analysis
  • 1 篇 opaque predicate

机构

  • 1 篇 penn state univ ...
  • 1 篇 univ texas arlin...
  • 1 篇 etri cryptog res...
  • 1 篇 korea adv inst s...
  • 1 篇 sichuan univ col...
  • 1 篇 sichuan univ col...
  • 1 篇 pennstate univer...

作者

  • 2 篇 xu dongpeng
  • 1 篇 wu dinghao
  • 1 篇 jho nam-su
  • 1 篇 zhou anmin
  • 1 篇 kang yousung
  • 1 篇 liu luping
  • 1 篇 wang yan
  • 1 篇 kim myungchul
  • 1 篇 liu liang
  • 1 篇 jia li
  • 1 篇 jia peng
  • 1 篇 lee seungkwang
  • 1 篇 ming jiang
  • 1 篇 chung doyoung

语言

  • 4 篇 英文
检索条件"主题词=Cryptographic Function Detection"
4 条 记 录,以下是1-10 订阅
排序:
A Neural Network-Based Approach for cryptographic function detection in Malware
收藏 引用
IEEE ACCESS 2020年 8卷 23506-23521页
作者: Jia, Li Zhou, Anmin Jia, Peng Liu, Luping Wang, Yan Liu, Liang Sichuan Univ Coll Cybersecur Chengdu 610065 Peoples R China Sichuan Univ Coll Elect & Informat Engn Chengdu 610065 Peoples R China
cryptographic technology has been commonly used in malware for hiding their static characteristics and malicious behaviors to avoid the detection of anti-virus engines and counter the reverse analysis from security re... 详细信息
来源: 评论
cryptographic function detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping
Cryptographic Function Detection in Obfuscated Binaries via ...
收藏 引用
38th IEEE Symposium on Security and Privacy (SP)
作者: Xu, Dongpeng Ming, Jiang Wu, Dinghao Penn State Univ University Pk PA 16802 USA Univ Texas Arlington Arlington TX 76019 USA
cryptographic functions have been commonly abused by malware developers to hide malicious behaviors, disguise destructive payloads, and bypass network-based firewalls. Now-infamous crypto-ransomware even encrypts vict... 详细信息
来源: 评论
Rcryptect: Real-time detection of cryptographic function in the user-space filesystem
收藏 引用
COMPUTERS & SECURITY 2022年 112卷 102512-102512页
作者: Lee, Seungkwang Jho, Nam-su Chung, Doyoung Kang, Yousung Kim, Myungchul Korea Adv Inst Sci & Technol Dept Sch Comp Daejeon 34141 South Korea ETRI Cryptog Res Team Daejeon 34129 South Korea
The existing methods of ransomware detection have limitations. To be specific, static analysis is not effective to obfuscated binaries, while dynamic analysis is usually restricted to a certain platform and often take... 详细信息
来源: 评论
Opaque Predicate: Attack and Defense in Obfuscated Binary Code
Opaque Predicate: Attack and Defense in Obfuscated Binary Co...
收藏 引用
作者: Xu, Dongpeng PennState University Libraries
学位级别:Doctor of Philosophy
An opaque predicate is a predicate whose value is known to the obfuscator but is difficult to deduce. It can be seamlessly applied together with other obfuscation methods such as junk code to turn reverse engineering ... 详细信息
来源: 评论