• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wei Qiang, Wu Zehui, and Wang Qingxian. Plaintext Recovery Based on Memory Dependence Measurement[J]. Journal of Computer Research and Development, 2014, 51(7): 1547-1554.
Citation: Wei Qiang, Wu Zehui, and Wang Qingxian. Plaintext Recovery Based on Memory Dependence Measurement[J]. Journal of Computer Research and Development, 2014, 51(7): 1547-1554.

Plaintext Recovery Based on Memory Dependence Measurement

More Information
  • Published Date: July 14, 2014
  • Software analysis has had a devastating effect on software security. In the area of software analysis, data flow analysis can effectively identify the data processing and recognize the bounds of data structures, which helps us better understand the behavior of the program. However, for the programs that use data encryption technology for communication, data flow analysis will encounter great difficulties because it cannot automatically extract decrypted data, and hence cannot effectively track data processing which is pivotal for software analysis. In this work we propose memory dependence measurement, a novel approach for finding and extracting decrypted data on commodity software. While previous work focuses on the recognition of decryption functions and instructions, our method shifts the focus to identifying the memory address of decrypted data. We implement our memory dependence technique in a tool called EncMemCheck. Experiments show that EncMemCheck has more accuracy on real-word encryption algorithm. It is proved that our approach is more practical by testing it on community software UnrealIrcd which adopts encryption technology during communication.
  • Related Articles

    [1]Yin Xiaokang, Lu Bin, Cai Ruijie, Zhu Xiaoya, Yang Qichao, Liu Shengli. Memory Copy Function Identification Technique with Control Flow and Data Flow Analysis[J]. Journal of Computer Research and Development, 2023, 60(2): 326-340. DOI: 10.7544/issn1000-1239.202110990
    [2]Yang Fan, Li Fei, Shu Jiwu. Survey on Secure Persistent Memory Storage[J]. Journal of Computer Research and Development, 2020, 57(5): 912-927. DOI: 10.7544/issn1000-1239.2020.20190820
    [3]Miao Dongjing, Liu Xianmin, Li Jianzhong. An Algorithm on Mining Approximate Functional Dependencies in Probabilistic Database[J]. Journal of Computer Research and Development, 2015, 52(12): 2857-2865. DOI: 10.7544/issn1000-1239.2015.20140685
    [4]Li Weibang, Li Zhanhuai, Chen Qun, Jiang Tao, Liu Hailong, Pan Wei. Functional Dependencies Discovering in Distributed Big Data[J]. Journal of Computer Research and Development, 2015, 52(2): 282-294. DOI: 10.7544/issn1000-1239.2015.20140229
    [5]Liu Xianmin, Li Jianzhong. Discovering Extended Conditional Functional Dependencies[J]. Journal of Computer Research and Development, 2015, 52(1): 130-140. DOI: 10.7544/issn1000-1239.2015.20130691
    [6]Xue Jinrong, An Qiusheng, Zheng Jun. Intent Reduction of Concept Lattice and Database Inference Dependence[J]. Journal of Computer Research and Development, 2014, 51(1): 96-103.
    [7]Zeng Kun and Yang Xuejun. A Best-Effort Hardware Transactional Memory Based on Dependency Graph[J]. Journal of Computer Research and Development, 2012, 49(1): 44-54.
    [8]Chen Chi, Feng Dengguo, and Xu Zhen. Research on Database Transaction Recovery Log and Intrusion Response[J]. Journal of Computer Research and Development, 2010, 47(10): 1797-1804.
    [9]Hao Zhongxiao, Li Yanjuan. Study on Membership Problem with Respect to Temporal Functional Dependencies and Temporal Multivalued Dependencies[J]. Journal of Computer Research and Development, 2006, 43(7): 1267-1272.
    [10]Lü Teng, Yan Ping. Functional Dependencies and Inference Rules for XML[J]. Journal of Computer Research and Development, 2005, 42(5): 792-796.

Catalog

    Article views (893) PDF downloads (780) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return