-
1
-
-
85080731454
-
-
RC4, 1994. http://web.archive.org/web/20080404222417/http://cypherpunks.venona.com/date/1994/09/msg00304.html.
-
(1994)
RC4
-
-
-
2
-
-
85080667639
-
-
RTMP, 2009. http://wwwimages.adobe.com/www.adobe.com/content/dam/Adobe/en/devnet/rtmp/pdf/rtmp_specification_1.0.pdf.
-
(2009)
RTMP
-
-
-
3
-
-
85080742583
-
-
Adobe RTMPE, 2012. http://lkcl.net/rtmp/RTMPE.txt.
-
(2012)
Adobe RTMPE
-
-
-
4
-
-
85080751724
-
-
Audials software, 2012. http://audials.com/en/how_to_record_stream_capture_music_videos_movies_from/netflix.html.
-
(2012)
Audials Software
-
-
-
5
-
-
85080707810
-
-
The despotify project, 2012. http://despotify.se/.
-
(2012)
-
-
-
7
-
-
85080678916
-
-
Esperanza project, 2012. http://code.google.com/p/esperanza.
-
(2012)
Esperanza Project
-
-
-
10
-
-
85080642860
-
-
Microsoft PlayReady DRM, 2012. http://msdn.microsoft.com/en-us/library/cc838192(VS.95).aspx.
-
(2012)
Microsoft PlayReady DRM
-
-
-
11
-
-
85080670439
-
-
Microsoft protected media path, 2012. http://scholar.google.com/scholar?hl=en&q=protected+media+path&btnG=&as_sdt=1%2C5&as_sdtp=.
-
(2012)
Microsoft Protected Media Path
-
-
-
12
-
-
85080800696
-
-
Nation of unrepentant pirates costs $900m, 2012. http://www.smh.com.au/technology/technology-news/nation-of\%2Dunrepentant-pirates-costs\%2D900m-20110305\%2D1bix5.html.
-
(2012)
Nation of Unrepentant Pirates Costs $900m
-
-
-
15
-
-
85080662776
-
-
Spotify DRM, 2012. http://www.defectivebydesign.org/spotify.
-
(2012)
Spotify DRM
-
-
-
16
-
-
85063636742
-
QEMU, a fast and portable dynamic translator
-
F. Bellard. QEMU, a fast and portable dynamic translator. USENIX, 2005.
-
(2005)
USENIX
-
-
Bellard, F.1
-
17
-
-
21644459205
-
Watermarking to track motion picture theft
-
Conference Record of the Thirty-Eighth Asilomar Conference on IEEE
-
J. Bloom and C. Polyzois. Watermarking to track motion picture theft. In Signals, Systems and Computers, 2004. Conference Record of the Thirty-Eighth Asilomar Conference on, Volume 1, pages 363-367. IEEE, 2004.
-
(2004)
Signals, Systems and Computers, 2004
, vol.1
, pp. 363-367
-
-
Bloom, J.1
Polyzois, C.2
-
18
-
-
0029694397
-
Digital watermarks for audio signals
-
Proceedings of the Third IEEE International Conference on IEEE
-
L. Boney, A. Tewfik, and K. Hamdy. Digital watermarks for audio signals. In Multimedia Computing and Systems, 1996., Proceedings of the Third IEEE International Conference on, pages 473-480. IEEE, 1996.
-
(1996)
Multimedia Computing and Systems, 1996
, pp. 473-480
-
-
Boney, L.1
Tewfik, A.2
Hamdy, K.3
-
19
-
-
80052668242
-
-
Technical report, DTIC Document
-
J. Caballero, N. M. Johnson, S. McCamant, and D. Song. Binary code extraction and interface identification for security applications. Technical report, DTIC Document, 2009.
-
(2009)
Binary Code Extraction and Interface Identification for Security Applications
-
-
Caballero, J.1
Johnson, N.M.2
McCamant, S.3
Song, D.4
-
20
-
-
74049095923
-
Dispatcher: Enabling active botnet infiltration using automatic protocol reverseengineering
-
J. Caballero, P. Poosankam, C. Kreibich, and D. Song. Dispatcher: Enabling active botnet infiltration using automatic protocol reverseengineering. In Proceedings of the 16th ACM conference on Computer and communications security, pages 621-634. ACM, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 621-634
-
-
Caballero, J.1
Poosankam, P.2
Kreibich, C.3
Song, D.4
-
21
-
-
78650029404
-
Input generation via decomposition and re-stitching: Finding bugs in malware
-
J. Caballero, P. Poosankam, S. McCamant, D. Song, et al. Input generation via decomposition and re-stitching: Finding bugs in malware. In Proceedings of the 17th ACM conference on Computer and communications security, pages 413-425. ACM, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security
, pp. 413-425
-
-
Caballero, J.1
Poosankam, P.2
McCamant, S.3
Song, D.4
-
24
-
-
35248853376
-
A white-box des implementation for drm applications
-
Springer
-
S. Chow, P. Eisen, H. Johnson, and P. C. Van Oorschot. A white-box des implementation for drm applications. In Digital Rights Management, pages 1-15. Springer, 2003.
-
(2003)
Digital Rights Management
, pp. 1-15
-
-
Chow, S.1
Eisen, P.2
Johnson, H.3
Van Oorschot, P.C.4
-
28
-
-
0042634381
-
© watermark: Closing the analog hole
-
ICCE. 2003 IEEE International Conference on IEEE
-
E. Diehl and T. Furon. © watermark: Closing the analog hole. In Consumer Electronics, 2003. ICCE. 2003 IEEE International Conference on, pages 52-53. IEEE, 2003.
-
(2003)
Consumer Electronics, 2003
, pp. 52-53
-
-
Diehl, E.1
Furon, T.2
-
32
-
-
84857262964
-
Automated identification of cryptographic primitives in binary programs
-
Springer
-
F. Gröbert, C. Willems, and T. Holz. Automated identification of cryptographic primitives in binary programs. In Recent Advances in Intrusion Detection, pages 41-60. Springer, 2011.
-
(2011)
Recent Advances in Intrusion Detection
, pp. 41-60
-
-
Gröbert, F.1
Willems, C.2
Holz, T.3
-
34
-
-
77955195701
-
Inspector gadget: Automated extraction of proprietary gadgets from malware binaries
-
C. Kolbitsch, T. Holz, C. Kruegel, and E. Kirda. Inspector gadget: Automated extraction of proprietary gadgets from malware binaries. In Security and Privacy (SP), 2010 IEEE Symposium on, pages 29-44. IEEE, 2010.
-
(2010)
Security and Privacy (SP), 2010 IEEE Symposium on
, pp. 29-44
-
-
Kolbitsch, C.1
Holz, T.2
Kruegel, C.3
Kirda, E.4
-
35
-
-
85056028631
-
Removing spatial spread spectrum watermarks
-
G. Langelaar, R. Lagendijk, and J. Biemond. Removing spatial spread spectrum watermarks. In Proceedings of the European Signal Processing Conference (EUSIPCO98), Rodes, Greece, 1998.
-
(1998)
Proceedings of the European Signal Processing Conference (EUSIPCO98), Rodes, Greece
-
-
Langelaar, G.1
Lagendijk, R.2
Biemond, J.3
-
38
-
-
33745304805
-
Pin: Building customized program analysis tools with dynamic instrumentation
-
C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. Reddi, and K. Hazelwood. Pin: building customized program analysis tools with dynamic instrumentation. In ACM SIGPLAN Notices, Volume 40, pages 190-200. ACM, 2005.
-
(2005)
ACM SIGPLAN Notices
, vol.40
, pp. 190-200
-
-
Luk, C.1
Cohn, R.2
Muth, R.3
Patil, H.4
Klauser, A.5
Lowney, G.6
Wallace, S.7
Reddi, V.8
Hazelwood, K.9
-
40
-
-
35348905267
-
LoopProf: Dynamic techniques for loop detection and profiling
-
T. Moseley, D. Grunwald, D. Connors, R. Ramanujam, V. Tovinkere, and R. Peri. LoopProf: Dynamic techniques for loop detection and profiling. In Proceedings of the 2006 Workshop on Binary Instrumentation and Applications (WBIA), 2006.
-
(2006)
Proceedings of the 2006 Workshop on Binary Instrumentation and Applications (WBIA)
-
-
Moseley, T.1
Grunwald, D.2
Connors, D.3
Ramanujam, R.4
Tovinkere, V.5
Peri, R.6
-
42
-
-
84890522850
-
Communication theory of secrecy systems
-
C. Shannon. Communication theory of secrecy systems. Bell system technical journal, 28(4):656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.1
-
43
-
-
84951736831
-
Howard: A dynamic excavator for reverse engineering data structures
-
A. Slowinska, T. Stancescu, and H. Bos. Howard: a dynamic excavator for reverse engineering data structures. In Proceedings of NDSS, 2011.
-
(2011)
Proceedings of NDSS
-
-
Slowinska, A.1
Stancescu, T.2
Bos, H.3
-
45
-
-
0033353026
-
Internet streaming SIMD extensions
-
S. Thakkur and T. Huff. Internet streaming SIMD extensions. Computer, 32(12):26-34, 1999.
-
(1999)
Computer
, vol.32
, Issue.12
, pp. 26-34
-
-
Thakkur, S.1
Huff, T.2
-
46
-
-
70350399651
-
Reformat: Automatic reverse engineering of encrypted messages
-
Z. Wang, X. Jiang, W. Cui, X. Wang, and M. Grace. Reformat: Automatic reverse engineering of encrypted messages. Computer Security-ESORICS 2009, pages 200-215, 2009.
-
(2009)
Computer Security-ESORICS 2009
, pp. 200-215
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Wang, X.4
Grace, M.5
-
50
-
-
77957584064
-
Privacy scope: A precise information flow tracking system for finding application leaks
-
Department of Computer Science, UC Berkeley
-
Y. Zhu, J. Jung, D. Song, T. Kohno, and D. Wetherall. Privacy scope: A precise information flow tracking system for finding application leaks. Technical report, Tech. Rep. EECS-2009-145, Department of Computer Science, UC Berkeley, 2009.
-
(2009)
Technical Report, Tech. Rep. EECS-2009-145
-
-
Zhu, Y.1
Jung, J.2
Song, D.3
Kohno, T.4
Wetherall, D.5
|