-
1
-
-
84870636714
-
-
AsProtect packer. http://www.aspack.com/asprotect.html.
-
-
-
-
2
-
-
84870633312
-
-
Polar SSL library Web site. http://polarssl.org.
-
-
-
-
5
-
-
84870652419
-
-
F. Boldewin. Peacomm.c Cracking the nutshell. http://www.reconstructer. org/papers/Peacomm.C-Crackingthenutshell.zip.
-
-
-
Boldewin, F.1
-
6
-
-
74049095923
-
Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering
-
J. Caballero, P. Poosankam, C. Kreibich, and D. Song. Dispatcher: Enabling active botnet infiltration using automatic protocol reverse-engineering. In Proc. 16th ACM Conf. on Computer and Communications Security (CCS), pages 621-634, 2009.
-
(2009)
Proc. 16th ACM Conf. on Computer and Communications Security (CCS)
, pp. 621-634
-
-
Caballero, J.1
Poosankam, P.2
Kreibich, C.3
Song, D.4
-
7
-
-
77950168491
-
Malware authors don't learn, and that's good!
-
IEEE
-
J. Calvet, C. Davis, and P. Bureau. Malware authors don't learn, and that's good! In Proc. 4th Int. Conf. on Malicious and Unwanted Software (MALWARE), pages 88-97. IEEE, 2009.
-
(2009)
Proc. 4th Int. Conf. on Malicious and Unwanted Software (MALWARE)
, pp. 88-97
-
-
Calvet, J.1
Davis, C.2
Bureau, P.3
-
11
-
-
66149173689
-
Lest we remember: Cold-boot attacks on encryption keys
-
J. Halderman, S. Schoen, N. Heninger, W. Clarkson, W. Paul, J. Calandrino, A. Feldman, J. Appelbaum, and E. Felten. Lest we remember: cold-boot attacks on encryption keys. Comm. of the ACM, 52(5):91-98, 2009.
-
(2009)
Comm. of the ACM
, vol.52
, Issue.5
, pp. 91-98
-
-
Halderman, J.1
Schoen, S.2
Heninger, N.3
Clarkson, W.4
Paul, W.5
Calandrino, J.6
Feldman, A.7
Appelbaum, J.8
Felten, E.9
-
12
-
-
84870650462
-
-
S. Henson et al. OpenSSL library.http://openssl.org.
-
-
-
Henson, S.1
-
13
-
-
0003620778
-
-
Addison-Wesley
-
J. Hopcroft, R. Motwani, and J. Ullman. Introduction to automata theory, languages, and computation. Addison-Wesley, 2007.
-
(2007)
Introduction to Automata Theory, Languages, and Computation
-
-
Hopcroft, J.1
Motwani, R.2
Ullman, J.3
-
14
-
-
0021377678
-
Dynamic characteristics of loops
-
M. Kobayashi. Dynamic characteristics of loops. IEEE Trans. on Computers, 100(2):125-132, 1984.
-
(1984)
IEEE Trans. on Computers
, vol.100
, Issue.2
, pp. 125-132
-
-
Kobayashi, M.1
-
17
-
-
33745304805
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. Reddi, and K. Hazelwood. Pin: building customized program analysis tools with dynamic instrumentation. ACM SIGPLAN Notices, 40:190-200, 2005.
-
(2005)
ACM SIGPLAN Notices
, vol.40
, pp. 190-200
-
-
Luk, C.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.8
Hazelwood, K.9
-
19
-
-
68649097821
-
The persistence of memory: Forensic identification and extraction of cryptographic keys
-
C. Maartmann-Moe, S. Thorkildsen, and A. Arnes. The persistence of memory: Forensic identification and extraction of cryptographic keys. Digital Investigation, 6:S132-S140, 2009.
-
(2009)
Digital Investigation
, vol.6
-
-
Maartmann-Moe, C.1
Thorkildsen, S.2
Arnes, A.3
-
20
-
-
84966243285
-
Modular multiplication without trial division
-
P. Montgomery. Modular multiplication without trial division. Mathematics of Computation, 44(170):519-521, 1985.
-
(1985)
Mathematics of Computation
, vol.44
, Issue.170
, pp. 519-521
-
-
Montgomery, P.1
-
21
-
-
80053629393
-
Useful and useless statistics about viruses and anti-virus programs
-
M. Morgenstern and H. Pilz. Useful and useless statistics about viruses and anti-virus programs. In Proc. CARO Workshop, 2010.
-
(2010)
Proc. CARO Workshop
-
-
Morgenstern, M.1
Pilz, H.2
-
22
-
-
84870628090
-
-
L. O Murchu. Trojan.silentbanker decryption. http://www.symantec.com/ connect/blogs/trojansilentbanker-decryption.
-
-
-
Murchu, L.O.1
-
24
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Comm. of the ACM, 21(2):120-126, 1978.
-
(1978)
Comm. of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
25
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28(4):656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.E.1
-
26
-
-
80052735307
-
Inside the storm: Protocols and encryption of the Storm botnet
-
N. Stewart. Inside the storm: Protocols and encryption of the Storm botnet. In Black Hat Technical Security Conference, 2008.
-
(2008)
Black Hat Technical Security Conference
-
-
Stewart, N.1
-
29
-
-
84870634585
-
-
VeriSign. Silentbanker analysis. http://www.verisign.com/static/043671. pdf.
-
Silentbanker Analysis
-
-
-
30
-
-
84870639392
-
-
Russian TEA assembly code
-
Russian TEA assembly code. http://www.xakep.ru/post/22086/default.asp.
-
-
-
-
31
-
-
0012037951
-
Software tamper resistance: Obstructing static analysis of programs
-
C. Wang, J. Hill, J. Knight, and J. Davidson. Software tamper resistance: Obstructing static analysis of programs. Technical Report CS-2000-12, University of Virginia, 2000.
-
(2000)
Technical Report CS-2000-12, University of Virginia
-
-
Wang, C.1
Hill, J.2
Knight, J.3
Davidson, J.4
-
32
-
-
70350399651
-
ReFormat: Automatic reverse engineering of encrypted messages
-
Z. Wang, X. Jiang, W. Cui, X. Wang, and M. Grace. ReFormat: Automatic reverse engineering of encrypted messages. In Proc. ESORICS, pages 200-215, 2009.
-
(2009)
Proc. ESORICS
, pp. 200-215
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Wang, X.4
Grace, M.5
-
34
-
-
84870642966
-
-
RC4 source code. http://cypherpunks.venona.com/date/1994/09/msg00304. html.
-
RC4 Source Code
-
-
-
37
-
-
80054815331
-
Detection and analysis of cryptographic data inside software
-
R. Zhao, D. Gu, J. Li, and R. Yu. Detection and analysis of cryptographic data inside software. Information Security, pages 182-196, 2011.
-
(2011)
Information Security
, pp. 182-196
-
-
Zhao, R.1
Gu, D.2
Li, J.3
Yu, R.4
|