Next Article in Journal
QoS Self-Provisioning and Interference Management for Co-Channel Deployed 3G Femtocells
Next Article in Special Issue
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems
Previous Article in Journal
Energy–QoS Trade-Offs in Mobile Service Selection
Open AccessArticle

A Methodology for Retrieving Information from Malware Encrypted Output Files: Brazilian Case Studies

GSeg (Information Security Department), CPqD, Rua Dr. Ricardo Benetton Martins, 13086-902 Campinas, Brazil
Future Internet 2013, 5(2), 140-167; https://doi.org/10.3390/fi5020140
Received: 18 February 2013 / Revised: 6 April 2013 / Accepted: 15 April 2013 / Published: 25 April 2013
(This article belongs to the Special Issue Security of Systems and Software Resiliency)
This article presents and explains a methodology based on cryptanalytic and reverse engineering techniques that can be employed to quickly recover information from encrypted files generated by malware. The objective of the methodology is to minimize the effort with static and dynamic analysis, by using cryptanalysis and related knowledge as much as possible. In order to illustrate how it works, we present three case studies, taken from a big Brazilian company that was victimized by directed attacks focused on stealing information from a special purpose hardware they use in their environment. View Full-Text
Keywords: malware; cryptanalysis; reverse engineering; stolen information malware; cryptanalysis; reverse engineering; stolen information
Show Figures

Figure 1

MDPI and ACS Style

Uto, N. A Methodology for Retrieving Information from Malware Encrypted Output Files: Brazilian Case Studies. Future Internet 2013, 5, 140-167.

Show more citation formats Show less citations formats

Article Access Map by Country/Region

1
Only visits after 24 November 2015 are recorded.
Search more from Scilit
 
Search
Back to TopTop