메뉴 건너뛰기




Volumn 6961 LNCS, Issue , 2011, Pages 41-60

Automated identification of cryptographic primitives in binary programs

Author keywords

Binary Analysis; Cryptography; Malware Analysis

Indexed keywords

AUTOMATED IDENTIFICATION; BINARY ANALYSIS; BINARY PROGRAMS; CRYPTOGRAPHIC ALGORITHMS; CRYPTOGRAPHIC CODES; CRYPTOGRAPHIC KEY; CRYPTOGRAPHIC PRIMITIVES; MALICIOUS SOFTWARE; MALWARE ANALYSIS; MALWARES; STATE-OF-THE-ART APPROACH;

EID: 84857262964     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-23644-0_3     Document Type: Conference Paper
Times cited : (64)

References (23)
  • 1
    • 33947609379 scopus 로고    scopus 로고
    • On the Possibility of Practically Obfuscating Programs Towards a Unified Perspective of Code Protection
    • Beaucamps, P., Filiol, E.: On the Possibility of Practically Obfuscating Programs Towards a Unified Perspective of Code Protection. Journal in Computer Virology 3(1), 3-21 (2007)
    • (2007) Journal in Computer Virology , vol.3 , Issue.1 , pp. 3-21
    • Beaucamps, P.1    Filiol, E.2
  • 9
    • 70349288862 scopus 로고    scopus 로고
    • Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
    • The Internet Society
    • Lin, Z., Jiang, X., Xu, D., Zhang, X.: Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. In: Network and Distributed System Security (NDSS). The Internet Society (2008)
    • (2008) Network and Distributed System Security (NDSS)
    • Lin, Z.1    Jiang, X.2    Xu, D.3    Zhang, X.4
  • 14
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software
    • Newsome, J., Song, D.X.: Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. In: Network and Distributed System Security, NDSS (2005)
    • (2005) Network and Distributed System Security, NDSS
    • Newsome, J.1    Song, D.X.2
  • 17
    • 84857245291 scopus 로고    scopus 로고
    • Inside the Storm: Protocols and Encryption of the Storm Botnet
    • Stewart, J.: Inside the Storm: Protocols and Encryption of the Storm Botnet. Black Hat USA (2008)
    • (2008) Black Hat USA
    • Stewart, J.1
  • 19
    • 84857245292 scopus 로고    scopus 로고
    • Static Disassembly and Code Analysis
    • Vigna, G.: Static Disassembly and Code Analysis. Malware Detection (2006)
    • (2006) Malware Detection
    • Vigna, G.1
  • 20
    • 70350399651 scopus 로고    scopus 로고
    • ReFormat: Automatic Reverse Engineering of Encrypted Messages
    • Backes, M., Ning, P. (eds.) ESORICS 2009. Springer, Heidelberg
    • Wang, Z., Jiang, X., Cui, W., Wang, X., Grace, M.: ReFormat: Automatic Reverse Engineering of Encrypted Messages. In: Backes, M., Ning, P. (eds.) ESORICS 2009. LNCS, vol. 5789, pp. 200-215. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5789 , pp. 200-215
    • Wang, Z.1    Jiang, X.2    Cui, W.3    Wang, X.4    Grace, M.5
  • 23
    • 0029705858 scopus 로고    scopus 로고
    • Cryptovirology: Extortion-Based Security Threats and Counter-measures
    • Young, A., Yung,M.: Cryptovirology: Extortion-Based Security Threats and Counter-measures. In: IEEE Symposium on Security and Privacy. pp. 129-141 (1996)
    • (1996) IEEE Symposium on Security and Privacy , pp. 129-141
    • Young, A.1    Yung, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.