Deep Learning Based Cryptographic Primitive Classification

09/25/2017
by   Gregory D. Hill, et al.
0

Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike. Established preventive measures perform well, however, the problem has not ceased. Reverse engineering potentially malicious software is a cumbersome task due to platform eccentricities and obfuscated transmutation mechanisms, hence requiring smarter, more efficient detection strategies. The following manuscript presents a novel approach for the classification of cryptographic primitives in compiled binary executables using deep learning. The model blueprint, a DCNN, is fittingly configured to learn from variable-length control flow diagnostics output from a dynamic trace. To rival the size and variability of contemporary data compendiums, hence feeding the model cognition, a methodology for the procedural generation of synthetic cryptographic binaries is defined, utilising core primitives from OpenSSL with multivariate obfuscation, to draw a vastly scalable distribution. The library, CryptoKnight, rendered an algorithmic pool of AES, RC4, Blowfish, MD5 and RSA to synthesis combinable variants which are automatically fed in its core model. Converging at 91 is successfully able to classify the sample algorithms with minimal loss.

READ FULL TEXT
research
09/09/2020

Where's Crypto?: Automated Identification and Classification of Proprietary Cryptographic Primitives in Binary Code

The continuing use of proprietary cryptography in embedded systems acros...
research
09/23/2020

Applying the Roofline model for Deep Learning performance optimizations

In this paper We present a methodology for creating Roofline models auto...
research
10/03/2018

Towards Low-level Cryptographic Primitives for JavaCards

JavaCard is a multi-application security platform deployed to over twent...
research
04/21/2020

Towards Automated Augmentation and Instrumentation of Legacy Cryptographic Executables: Extended Version

Implementation flaws in cryptographic libraries, design flaws in algorit...
research
04/12/2023

SePEnTra: A secure and privacy-preserving energy trading mechanisms in transactive energy market

In this paper, we design and present a novel model called SePEnTra to en...
research
01/10/2019

Secure and Computationally-Efficient Cryptographic Primitive based on Cellular Automation

Mageto, a random number generator based on one-dimensional cellular auto...
research
10/05/2021

Notarial timestamps savings in logs management via Merkle trees and Key Derivation Functions

Nowadays log files handling imposes to ISPs (intended in their widest sc...

Please sign up or login with your details

Forgot password? Click here to reset