Back to Search
Start Over
Encryption and Re-Randomization Techniques for Malware Propagation
- Source :
- IEEE Access, Vol 9, Pp 132522-132532 (2021)
- Publication Year :
- 2021
- Publisher :
- IEEE, 2021.
-
Abstract
- Encryption, which is essential for the protection of sensitive information can also transform any malicious content to illegible form, which can then reside in any network, undetected. Encryption of malicious payload is used by malware authors to mask their code, however, the objective of hiding the malicious code can be further improved by techniques of re-randomization. The concept of re-randomization using asymmetric cryptography has been emerged as a new area of interest for malware designers. Re-randomizing is a technique which can prevent detection of source path of a malware and makes it indistinguishable. This article extends the idea of using asymmetric cryptography for re-randomization and has proposed a novel scheme using Pailliar’s asymmetric cryptosystem. Moreover, this research work illustrates the limitations of RSA for malware re-randomization. A comprehensive performance analysis of the re-randomization techniques for various malware payloads is also presented, which can be used for the detection of re-randomized malware effectively.
- Subjects :
- Software_OPERATINGSYSTEMS
General Computer Science
Computer science
Paillier cryptosystem
homomorphic encryption
Cryptography
computer.software_genre
Computer security
Encryption
re-encryption
ElGamal
Public-key cryptography
RSA
malware encryption
Code (cryptography)
Cryptosystem
General Materials Science
business.industry
Payload
General Engineering
TK1-9971
Information sensitivity
ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS
Malware
Electrical engineering. Electronics. Nuclear engineering
business
computer
Subjects
Details
- Language :
- English
- ISSN :
- 21693536
- Volume :
- 9
- Database :
- OpenAIRE
- Journal :
- IEEE Access
- Accession number :
- edsair.doi.dedup.....8b9e797564e557d9c974cae917d33b41