Third International Seminar on Artificial Intelligence, Networking, and Information Technology (AINIT 2022) 2023
DOI: 10.1117/12.2667625
|View full text |Cite
|
Sign up to set email alerts
|

Normalization method of encryption source in mimicry simulation system

Abstract: Although the mimic system can effectively defend against known or unknown vulnerabilities / backdoor attacks, some encryption protocols such as SSH will produce different encryption results on different executors, even with the same processor, the same operating system, the same encryption protocol and the same plaintext, which leads to difficulty in output arbitration. To solve this problem, this paper proposes an encryption source normalization method, which can make different executors generate same ciphert… Show more

Help me understand this report

This publication either has no citations yet, or we are still processing them

Set email alert for when this publication receives citations?

See others like this or search for similar articles