首页> 外文会议>International Conference on Information Security >Building a Cryptovirus Using Microsoft's Cryptographic API
【24h】

Building a Cryptovirus Using Microsoft's Cryptographic API

机译:使用微软的加密API构建Cryptovirus

获取原文

摘要

This paper presents the experimental results that were obtained by implementing the payload of a cryptovirus on the Microsoft Windows platform. A novel countermeasure against cryptoviral extortion is presented that forces the API caller to demonstrate that an authorized party can recover the asymmetrically encrypted data. The attack is based entirely on the Microsoft Cryptographic API and the needed API calls are covered in detail. The exact sequence of API calls that is used for both the viral payload and the code for key generation, decryption, and so on is given. More specifically, it is shown that by using 8 types of API calls and 72 lines of ANSI C code, the payload can hybrid encrypt sensitive data and hold it hostage on the host computer system. These findings demonstrate the ease with which one can apply cryptography to devise the payload of a cryptovirus when a cryptographic API is readily available on host machines.
机译:本文介绍了通过在Microsoft Windows平台上实施CryptoVirus的有效载荷而获得的实验结果。提出了一种针对密码敲击的新型对策,迫使API呼叫者证明授权方可以恢复不对称加密的数据。该攻击完全基于Microsoft加密API,并详细介绍了所需的API调用。给出了用于病毒有效载荷和键生成,解密等代码的API调用的确切序列。更具体地,示出了通过使用8种类型的API呼叫和72行ANSI C代码,有效载荷可以混合加密敏感数据并将其保存在主计算机系统上。这些发现表明,在主机上容易获得加密API时,可以施加密码学申请加密以设计加密病毒的有效载荷。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号