6 research outputs found
Anti-Disassembly using Cryptographic Hash Functions
Computer viruses sometimes employ coding techniques intended to make
analysis difficult for anti-virus researchers; techniques to obscure code to
impair static code analysis are called anti-disassembly techniques. We present
a new method of anti-disassembly based on cryptographic hash functions which
is portable, hard to analyze, and can be used to target particular computers
or users. Furthermore, the obscured code is not available in any analyzable
form, even an encrypted form, until it successfully runs. The method s
viability has been empirically confirmed. We look at possible countermeasures
for the basic anti-disassembly scheme, as well as variants scaled to use
massive computational power.We are currently acquiring citations for the work deposited into this collection. We recognize the distribution rights of this item may have been assigned to another entity, other than the author(s) of the work.If you can provide the citation for this work or you think you own the distribution rights to this work please contact the Institutional Repository Administrator at [email protected]
Improved Port Knocking with Strong Authentication
It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports to all others. We examine ways to construct an authentication service to achieve this goal, and then examine one such method, “port knocking”, and its existing implementations, in detail. We improve upon these existing implementations by presenting a novel port knocking architecture that provides strong authentication while addressing the weaknesses of existing port knocking systems. 1
Anti-disassembly using cryptographic hash functions
Science. He received a B.Sc. from the University of Calgary, and an M.Sc. and Ph.D. from the University of Victoria. He researches computer security and compilers, and conceived and taught the University's “Computer Viruses and Malware ” and “Spam and Spyware ” courses