A Vision for Enhancing Security of Cryptography in Executables

被引:0
|
作者
Brechelmacher, Otto [1 ]
Krenn, Willibald [1 ]
Tarrach, Thorsten [1 ]
机构
[1] AIT Austrian Inst Technol, Giefinggasse 4, A-1210 Vienna, Austria
基金
欧盟地平线“2020”;
关键词
D O I
10.1007/978-3-319-94496-8_1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes an idea on how to use existing techniques from late stage software customization to improve the security of software employing cryptographic functions. In our vision, we can verify an implemented algorithm and replace it with a faster or more trusted implementation if necessary. We also want to be able to add encryption to binaries that currently do not employ any, or gain access to unencrypted data if an application depends on encryption. To corroborate the feasibility of our vision, we developed a prototype that is able to identify cryptographic functions in highly optimized binary code and tests the identified functions for functional correctness, potentially also revealing backdoors.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [1] Enhancing Security by Combining Biometrics and Cryptography
    Popa, Diana
    Simion, Emil
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE - ECAI 2017, 2017,
  • [2] Cryptography Algorithms for Enhancing IoT Security
    Thabit, Fursan
    Can, Ozgu
    Aljahdali, Asia Othman
    Al-Gaphari, Ghaleb H.
    Alkhzaimi, Hoda A.
    [J]. INTERNET OF THINGS, 2023, 22
  • [3] Enhancing security of images by Steganography and Cryptography techniques
    Bukhari, Sadaf
    Arif, Muhammad Shoaib
    Anjum, M. R.
    Dilbar, Samia
    [J]. 2016 SIXTH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING TECHNOLOGY (INTECH), 2016, : 531 - 534
  • [4] ENHANCING home security through visual CRYPTOGRAPHY
    Mohan, Jinu
    Rajesh, R.
    [J]. MICROPROCESSORS AND MICROSYSTEMS, 2021, 80
  • [5] Enhancing Information Security and Privacy by Combining Biometrics with Cryptography
    Kanade, Sanjay G.
    Petrovska-Delacrétaz, Dijana
    Dorizzi, Bernadette
    [J]. Synthesis Lectures on Information Security, Privacy, and Trust, 2012, 3 (01): : 1 - 142
  • [6] TEAC: Timed Efficient Asymmetric Cryptography for Enhancing Security in VANET
    Mahagaonkar, Shilpa V.
    Dongre, Nilima
    [J]. 2017 INTERNATIONAL CONFERENCE ON NASCENT TECHNOLOGIES IN ENGINEERING (ICNTE-2017), 2017,
  • [7] Effective Cryptography Mechanism for Enhancing Security in Smart Key System
    Selvakumar, Madhumitha Sri
    Purushothkumar, Rohini
    Ramakrislman, Arunkumar
    Raja, Ciunasekaran
    [J]. 2018 10TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2018, : 190 - 195
  • [8] Hybrid Analysis Of Executables To Detect Security Vulnerabilities
    Kumar, Pranith D.
    Nema, Anchal
    Kumar, Rajeev
    [J]. ISEC 2009 - PROCEEDINGS OF THE 2ND INDIA SOFTWARE ENGINEERING CONFERENCE, 2009, : 141 - 142
  • [9] A security framework for executables in a ubiquitous computing environment
    Llewellyn-Jones, D
    Merabti, M
    Shi, Q
    Askwith, B
    [J]. GLOBECOM '04: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2004, : 2158 - 2163
  • [10] Enhancing Healthcare Data Security Using Quantum Cryptography for Efficient and Robust Encryption
    Basha, C. Bagath
    Murugan, K.
    Suresh, T.
    SrirengaNachiyar, V.
    Athimoolam, S.
    Pappa, C. Kanmani
    [J]. JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (05) : 1993 - 2000