Certified Malware: Measuring Breaches of Trust in the Windows Code-Signing PKI.
Doowon KimBum Jun KwonTudor DumitrasPublished in: CCS (2017)
Keyphrases
- trust model
- malicious code
- public key infrastructure
- static analysis
- windows xp
- api calls
- reverse engineering
- malware detection
- dynamic analysis
- public key
- source code
- windows nt
- trust relationships
- control flow
- digital signature
- signature scheme
- network traffic
- trust evaluation
- security mechanisms
- sign language
- security policies
- application programming interface
- key technologies
- database design