Presentation | 2015-06-11 An Empirical Evaluation of Locating Cryptographic Functions on the Memory Ryoya Furukawa, Ryoichi Isawa, Masakatu Morii, Daisuke Inoue, Koji Nakao, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | This paper presents a simple and effective idea to locate cryptographic functions on the memory for malware analysis. This leads an analyst to obtain plain-text packets that are encrypted on a secure channel established by malware when she analyzes it on a sandbox environment. Our idea is to observe a memory area where an encrypted packet is loaded. Besides, it is also to observe the areas where any pieces of data created from that encrypted packet are loaded. This is based on the fact that although a malware sample can load a sheer number of functions, functions that access to those memory areas denitely include cryptographic functions. With experiments using ten cryptographic programs, we extracted 37% of 134{460 functions as candidates on average, and extracted3% of them at best. In future work, the idea will be expanded for uniquely locating cryptographic functions. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Binary Analysis / Malware Analysis / Network Security / Cryptography |
Paper # | IA2015-4,ICSS2015-4 |
Date of Issue | 2015-06-04 (IA, ICSS) |
Conference Information | |
Committee | IA / ICSS |
---|---|
Conference Date | 2015/6/11(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | Kyushu Institute of Technology Univ. |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | Internet Security, etc. |
Chair | Ken-ichi Yoshida(Univ. of Tsukuba) / Yutaka Miyake(KDDI R&D Labs.) |
Vice Chair | Hiroyuki Osaki(Kwansei Gakuin Univ.) / Masahiro Jibiki(NICT) / Yutaka Nakamura(Kyushu Inst. of Tech.) / Takashi Nishide(Univ. of Tsukuba) / Yoshiaki Shiraishi(Kobe Univ.) |
Secretary | Hiroyuki Osaki(Tokyo Inst. of Tech.) / Masahiro Jibiki(Osaka Univ.) / Yutaka Nakamura(Mitsubishi Electric) / Takashi Nishide(NII) / Yoshiaki Shiraishi |
Assistant | Yuichiro Hei(KDDI R&D Labs.) / Hiroshi Yamamoto(Ritsumeikan Univ.) / Toshiki Watanabe(NEC) / Katsunari Yoshioka(Yokohama National Univ.) / Kazunori Kamiya(NTT) |
Paper Information | |
Registration To | Technical Committee on Internet Architecture / Technical Committee on Information and Communication System Security |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | An Empirical Evaluation of Locating Cryptographic Functions on the Memory |
Sub Title (in English) | |
Keyword(1) | Binary Analysis |
Keyword(2) | Malware Analysis |
Keyword(3) | Network Security |
Keyword(4) | Cryptography |
1st Author's Name | Ryoya Furukawa |
1st Author's Affiliation | Kobe University(Kobe Univ.) |
2nd Author's Name | Ryoichi Isawa |
2nd Author's Affiliation | National Institute of Information and Communications Technology(NICT) |
3rd Author's Name | Masakatu Morii |
3rd Author's Affiliation | Kobe University(Kobe Univ.) |
4th Author's Name | Daisuke Inoue |
4th Author's Affiliation | National Institute of Information and Communications Technology(NICT) |
5th Author's Name | Koji Nakao |
5th Author's Affiliation | National Institute of Information and Communications Technology(NICT) |
Date | 2015-06-11 |
Paper # | IA2015-4,ICSS2015-4 |
Volume (vol) | vol.115 |
Number (no) | IA-80,ICSS-81 |
Page | pp.pp.15-20(IA), pp.15-20(ICSS), |
#Pages | 6 |
Date of Issue | 2015-06-04 (IA, ICSS) |