期刊文献+

密码库模型建立与应用

Creating and applying cryptographic library model
在线阅读 下载PDF
导出
摘要 在逆向分析程序二进制代码时经常会遇到密码库函数。为了减少工作量,设计了一个面向分析人员的密码库模型。模型通过形式化的方法描述密码学框架和密码函数库的架构,并完成密码库函数属性到框架的映射,最后实现了数据解析与映射结果展示。模型能够解决两方面问题:一是掌握密码函数在库中所属的层次;二是了解该函数实现何种密码学相关算法、协议等信息,并以图形化方式展示结果。模型能够自动、快速地为分析人员找到相关知识,有助于学习密码学的整体抽象结构。 Analyzer always encounters cryptographic library functions when analyzing binary code. In order to simplify the workload of the reverse analyzer, a cryptographic model was designed. The model was designed using formal method to describe cryptographic frame and cryptographic library architecture, and then a mapping language was given to map cryptographic library function property to the frame and architecture, finally an API is designed to resolve the functions”parameter data and show mapping results. The model can help to resolve two kinds of problem: mastering the functions level in its library, understanding the function” s cryptographic algorithm and protocol information and show them graphically. The model resolved the problem of encountering cryptographic library function with its way of founding related knowledge automatically and rapidly. It can contribute to learn the whole cryptographic frame.
出处 《计算机应用》 CSCD 北大核心 2015年第A01期159-165,共7页 journal of Computer Applications
基金 国家863计划项目(2012AA012902)
关键词 密码库模型 密码库架构 密码算法 加解密密钥 加解密数据 信息恢复 cryptographic library model cryptographic library architecture cryptographic algorithm cryptographic key cryptographic data information recovery
  • 相关文献

参考文献12

  • 1BROOKS R R. Introduction to computer and network security[ M]. Boca Raton: CRC Press, 2013.
  • 2DWIVEDI A, DWIVEDI A, KUMAR S, etal. A cryptographic algo- rithm analysis for security threats of Semantic E-Commerce Web (SECW) for electronic payment transaction system[ C]// Advances in Computing and Information Technology, Advances in Intelligent Systems and Computing 178. Berlin: Springer, 2013:367-379.
  • 3李继中,舒辉.密码算法识别技术研究[J].信息网络安全,2011(11):46-49. 被引量:5
  • 4HALDERMAN J A, SCHOEN S D, HENINGER N, et al. Lest we remember: cold-bont attacks on encryption keys[ J]. Communica- tions of the ACM, 2009, 52(5): 91-98.
  • 5GUILFANOV I. FLIRT: fast library acquisition for identification and recognition[ EB/OL]. [ 2013 - 10 - 10]. https://www, hex- rays. eom/produets/ida/teeh/flirt/in_depth, shtml.
  • 6NETHERCOTE N. Dynamic binary analysis and instrumentation [ D]. Cambridge: University of Cambridge, 2004.
  • 7NETHERCOTE N, SEWARD J. Valgrind: a framework for heavy- weight dynamic binary instrumentation [ J]. ACM StGPLAN No- tices, 2007,3,2(6) : 89 - 100.
  • 8GROBERT F, WILLEMS C, HOLZ T. Automated identification of cryptographic primitives in binary prograws[ C]// Recent Advances in Intrusion Detection, LNCS 6961. Berlin: Springer, 2011:41-60.
  • 9CALVET J, FERNANDEZ J M, MARION J Y. Aligot: cupto- graphic function identification in obfuscated binary programs[ C]// Proceedings of the 19th ACM Conference on Computer and Commu- nications Security. New York: ACM, 2012:169 - 182.
  • 10ALLEN R J. A formal approach to software architecture, CMU-CS- 97-144[ D]. Pittsburgh: Carnegie-Mellon University School of Computer Science, 1997:3 -4.

二级参考文献4

共引文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部