JCC  Vol.3 No.5 , May 2015
Establishment and Application of Cryptographic Library Model
Abstract

When doing reverse analysis of program’s binary codes, it is often to encounter the function of cryptographic library. In order to reduce workload, a cryptographic library model has been designed by analysts. Models use formalized approach to describe the frame of cryptology and the structure of cryptographic function, complete the mapping from cryptographic function property to its architecture, and accomplish the result presentation of data analysis and mapping at last. The model can solve two problems: the first one is to know the hierarchy of the cryptographic function in the library well; the second one is to know some kinds of information, such as related cryptology algorithm and protocol, etc. These function implements can display the result graphically. The model can find relevant knowledge for the analysts automatically and rapidly, which is helpful to the learning of the overall abstract structure of cryptology.


Cite this paper
Liu, T. , Jiang, L. , Jing, J. and Zhang, Y. (2015) Establishment and Application of Cryptographic Library Model. Journal of Computer and Communications, 3, 21-32. doi: 10.4236/jcc.2015.35003.
References

[1]   Brooks, R.R. (2013) Introduction to Computer and Network Security. CRC Press.

[2]   Dwivedi, A., Dwivedi, A., Kumar, S., et al. (2013) A Cryptographic Algorithm Analysis for Security Threats of Semantic E-Commerce Web (SECW) for Electronic Payment Transaction System. Advances in Computing and Information Technology, Springer Berlin Heidelberg, 367-379. http://dx.doi.org/10.1007/978-3-642-31600-5_36

[3]   Li, J.-Z. and Shu, H. (2012) The Research of Crypto Algorithm Recognition Technology. The Security of Information Network, 11, 46-49.

[4]   Halderman, J.A., Schoen, S.D., Heninger, N., et al. (2009) Lest We Remember: Cold-Boot Attacks on Encryption Keys. Communications of the ACM, 52, 91-98. http://dx.doi.org/10.1145/1506409.1506429

[5]   Guilfanov, I. (2015) FLIRT: Fast Library Acquisition for Identification and Recognition. https://www.hex-rays.com/products/ida/tech/flirt/in_depth.shtml

[6]   Nethercote, N. (2004) Dynamic Binary Analysis and Instrumentation. Technical Report, University of Cambridge, UK.

[7]   Nethercote, N. and Seward, J. (2007) Valgrind: A Architecture for Heavyweight Dynamic Binary Instrumentation. ACM SIGPLAN Notices, 42, 89-100. http://dx.doi.org/10.1145/1273442.1250746

[8]   Gr?bert, F., Willems, C. and Holz, T. (2011) Automated Identification of Cryptographic Primitives in Binary Programs: Recent Advances in Intrusion Detection. Berlin: Springer Berlin Heidelberg, 41-60. http://dx.doi.org/10.1007/978-3-642-23644-0_3

[9]   Calvet, J., Fernandez, J.M. and Marion, J.Y. (2012) Aligot: Cryptographic Function Identification in Obfuscated Binary Programs. Proceedings of the 2012 ACM conference on Computer and Communications Security, 19th ACM Conference on Computer and Communications Security, 2012, 169-182. http://dx.doi.org/10.1145/2382196.2382217

[10]   Allen, R.J. (1997) A Formal Approach to Software Archi-tecture. Ph.D. Thesis, School of Computer Science, Carnegie Mellon University, Pittsburgh.

 
 
Top