EconPapers    
Economics at your fingertips  
 

A Methodology for Retrieving Information from Malware Encrypted Output Files: Brazilian Case Studies

Nelson Uto
Additional contact information
Nelson Uto: GSeg (Information Security Department), CPqD, Rua Dr. Ricardo Benetton Martins, 13086-902 Campinas, Brazil

Future Internet, 2013, vol. 5, issue 2, 1-28

Abstract: This article presents and explains a methodology based on cryptanalytic and reverse engineering techniques that can be employed to quickly recover information from encrypted files generated by malware. The objective of the methodology is to minimize the effort with static and dynamic analysis, by using cryptanalysis and related knowledge as much as possible. In order to illustrate how it works, we present three case studies, taken from a big Brazilian company that was victimized by directed attacks focused on stealing information from a special purpose hardware they use in their environment.

Keywords: malware; cryptanalysis; reverse engineering; stolen information (search for similar items in EconPapers)
JEL-codes: O3 (search for similar items in EconPapers)
Date: 2013
References: View complete reference list from CitEc
Citations:

Downloads: (external link)
https://www.mdpi.com/1999-5903/5/2/140/pdf (application/pdf)
https://www.mdpi.com/1999-5903/5/2/140/ (text/html)

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:gam:jftint:v:5:y:2013:i:2:p:140-167:d:25287

Access Statistics for this article

Future Internet is currently edited by Ms. Grace You

More articles in Future Internet from MDPI
Bibliographic data for series maintained by MDPI Indexing Manager ().

 
Page updated 2025-03-19
Handle: RePEc:gam:jftint:v:5:y:2013:i:2:p:140-167:d:25287