You are looking at a specific version 20171013:172920 of this paper.
See the latest version.
Paper 2017/1007
Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys
Herman Galteland and Kristian Gjøsteen
Abstract
Protecting malware using encryption prevents an analyst, defending some computer(s) in the network, from analyzing the malicious code and identifying the intentions of the malware author. We discuss malware encryption schemes that use environmental encryption keys, generated from some computer(s) the malware author intends to attack, and is able to rerandomize ciphertexts, to make each malware sample in the network indistinguishable. We are interested in hiding the intentions and identity of the malware author, not in hiding the existence of malware.
Metadata
- Available format(s)
- Publication info
- Published elsewhere. Major revision. Lecture Notes in Computer Science.
- DOI
- 10.1007/978-3-319-61273-7_12
- Keywords
- Malicious cryptographyenvironmental keysrerandomizationprovable security
- Contact author(s)
- herman galteland @ ntnu no
- History
- 2017-10-13: received
- Short URL
- https://ia.cr/2017/1007
- License
-
CC BY