Preprint Article Version 1 This version is not peer-reviewed

Using ASCON-Based Fuzzy Hashing for Efficient Malware Analysis

Version 1 : Received: 4 August 2024 / Approved: 4 August 2024 / Online: 6 August 2024 (06:24:08 CEST)

How to cite: Minhas, N.; Naveed, M. Using ASCON-Based Fuzzy Hashing for Efficient Malware Analysis. Preprints 2024, 2024080263. https://doi.org/10.20944/preprints202408.0263.v1 Minhas, N.; Naveed, M. Using ASCON-Based Fuzzy Hashing for Efficient Malware Analysis. Preprints 2024, 2024080263. https://doi.org/10.20944/preprints202408.0263.v1

Abstract

The rapid proliferation of digital devices and connectivity has seen an unprecedented rise in the threats of cyber-attacks, making cybersecurity a high research priority worldwide. Among the various forms of cyberattacks, malicious software or malware, significantly disrupts the privacy and integrity of data on millions of computing devices globally. It is already a well-established notion that robust malware analysis underpins successful protection systems in the rapidly changing threat landscape. Traditional malware detection techniques, although effective against known malware types, are often found wanting against new and sophisticated varieties. The situation necessitates the exploration of advanced techniques like cryptographic hashing and fuzzy hashing that have proven instrumental in handling malware's dynamic nature. Fuzzy hashing, by allowing a score-based match rather than an exact digital signature, enables the identification of unknown malware that are derivatives of known malwares. However, the efficiency of the fuzzy hashing algorithms comes to the forefront concerning the encryption used. The research paper titled, "Using ASCON-based Fuzzy Hashing for Efficient Malware Analysis," seeks to explore leveraging the ASCON encryption, a lightweight but secure encryption standard, in the application of fuzzy hashing for malware detection.

Keywords

Cryptography; Malware Analysis; ASCON

Subject

Computer Science and Mathematics, Computer Networks and Communications

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.