Detection and analysis of cryptographic data inside software

  • Authors:
  • Ruoxu Zhao;Dawu Gu;Juanru Li;Ran Yu

  • Affiliations:
  • Lab of Cryptology and Computer Security, Dept. of Computer Science, Shanghai Jiao Tong University, Shanghai, China;Lab of Cryptology and Computer Security, Dept. of Computer Science, Shanghai Jiao Tong University, Shanghai, China;Lab of Cryptology and Computer Security, Dept. of Computer Science, Shanghai Jiao Tong University, Shanghai, China;Lab of Cryptology and Computer Security, Dept. of Computer Science, Shanghai Jiao Tong University, Shanghai, China

  • Venue:
  • ISC'11 Proceedings of the 14th international conference on Information security
  • Year:
  • 2011

Quantified Score

Hi-index 0.03

Visualization

Abstract

Cryptographic algorithms are widely used inside software for data security and integrity. The search of cryptographic data (include algorithms, input-output data and intermediated states of operation) is important to security analysis. However, various implementations of cryptographic algorithms lead the automatic detection and analysis to be very hard. This paper proposes a novel automatic cryptographic data detection and analysis approach. This approach is based on execution tracing and data pattern extraction techniques, searching the data pattern of cryptographic algorithms, and automatically extracting detected Cryptographic algorithms and input-output data. We implement and evaluate our approach, and the result shows our approach can detect and extract common symmetric ciphers and hash functions in most kinds of programs with accuracy, effectiveness and universality.