A methodology for retrieving information from malware encrypted output files: Brazilian case studies

3Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

This article presents and explains a methodology based on cryptanalytic and reverse engineering techniques that can be employed to quickly recover information from encrypted files generated by malware. The objective of the methodology is to minimize the effort with static and dynamic analysis, by using cryptanalysis and related knowledge as much as possible. In order to illustrate how it works, we present three case studies, taken from a big Brazilian company that was victimized by directed attacks focused on stealing information from a special purpose hardware they use in their environment.

Cite

CITATION STYLE

APA

Uto, N. (2013). A methodology for retrieving information from malware encrypted output files: Brazilian case studies. Future Internet, 5(2), 140–167. https://doi.org/10.3390/fi5020140

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free