Malware, Encryption, and Rerandomization - Everything Is Under Attack.
Herman GaltelandKristian GjøsteenPublished in: Mycrypt (2016)
Keyphrases
- secret key
- encryption algorithm
- ciphertext
- attack scenarios
- detecting malicious
- encryption decryption
- detect malicious
- block cipher
- malware detection
- encryption algorithms
- pseudorandom
- reverse engineering
- key management
- encryption scheme
- intrusion detection system
- authentication scheme
- public key
- alert correlation
- standard model
- chaotic sequence
- countermeasures
- data encryption
- malicious code
- attack detection
- random number
- anti virus
- information hiding
- attack graph
- security properties
- security analysis
- smart card