Deobfuscating Embedded Malware Using Probable-Plaintext Attacks.
Christian WressneggerFrank BoldewinKonrad RieckPublished in: RAID (2013)
Keyphrases
- detect malicious
- chosen plaintext
- watermarking algorithm
- stream cipher
- malicious code
- watermarking technique
- detecting malicious
- watermarking scheme
- blind watermarking
- secret key
- block cipher
- attack scenarios
- reverse engineering
- attack detection
- security threats
- countermeasures
- embedded systems
- malware detection
- security analysis
- robust watermarking scheme
- denial of service attacks
- anti virus
- traffic analysis
- image watermarking
- pseudorandom
- malicious users
- ddos attacks
- computer security
- digital image watermarking scheme