A Survey of XOR as a Digital Obfuscation Technique in a Corpus of Real Data
Garfinkel, Simson L.
MetadataShow full item record
To determine the usage of XOR and the need to adapt additional tools, we analyzed 2,411 drive images from devices acquired around the world for the use of bytewise XOR as an obfuscation technique. Using a modified version of the open source digital forensics tool bulk˙extractor, evidence of XOR obfuscation was found on 698 drive images, with a maximum of 21,031 XOR-obfuscated features on a single drive. XOR usage in our corpus was observed in files with timestamps between the years 1995 and 2009, but the majority use was found in unallocated space. On the corpus tested, XOR obfuscation was used to circumvent malware detection and reverse engineering, to hide information that was apparently being exfiltrated, and by malware detection tools for their quarantine directory and to distribute malware signatures. We conclude that XOR obfuscation is important to consider when performing malware investigations.
NPS Report NumberNPS-CS-13-005
Showing items related by title, author, creator and subject.
NPSNET: an accurate low-cost technique for real-time display of transient events: vehicle collisions, explosions and terrain modifications Osborne, William Dale. (Monterey, California. Naval Postgraduate School, 1991-09);This work concentrates on a method for real-time collision detection and how to resolve that collision when it had occurred. The results of this effort are only a small part of the overall system, NPSNET. The collision ...
Sheridan-Barbian, Katherine K. (Monterey, California: Naval Postgraduate School, 2015-03);The Department of Defense and the intelligence community rely on space systems for a broad spectrum of services. These systems operate in highly constrained environments (in terms of space, weight and power), making ...