Encryption and Re-Randomization Techniques for Malware Propagation


Abbasi A.R. Afzal M. Iqbal W. Mussiraliyeva S. Khan F. Rehman A.U.
2021Institute of Electrical and Electronics Engineers Inc.

IEEE Access
2021#9132522 - 132532 pp.

Encryption, which is essential for the protection of sensitive information can also transform any malicious content to illegible form, which can then reside in any network, undetected. Encryption of malicious payload is used by malware authors to mask their code, however, the objective of hiding the malicious code can be further improved by techniques of re-randomization. The concept of re-randomization using asymmetric cryptography has been emerged as a new area of interest for malware designers. Re-randomizing is a technique which can prevent detection of source path of a malware and makes it indistinguishable. This article extends the idea of using asymmetric cryptography for re-randomization and has proposed a novel scheme using Pailliars asymmetric cryptosystem. Moreover, this research work illustrates the limitations of RSA for malware re-randomization. A comprehensive performance analysis of the re-randomization techniques for various malware payloads is also presented, which can be used for the detection of re-randomized malware effectively.

ElGamal , environmental keys , homomorphic encryption , malware encryption , Paillier cryptosystem , re-encryption , RSA

Text of the article Перейти на текст статьи

Department of Information Security, National University of Sciences and Technology, Islamabad, Pakistan
Department of Information Systems, Al-Farabi Kazakh National University, Almaty, Kazakhstan
Department of Computer Science, University of South Asia, Lahore, Pakistan

Department of Information Security
Department of Information Systems
Department of Computer Science

10 лет помогаем публиковать статьи Международный издатель

Книга Публикация научной статьи Волощук 2026 Book Publication of a scientific article 2026