CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution
暂无分享,去创建一个
Xin Li | Xinyuan Wang | Wentao Chang | Wentao Chang | Xin Li | Xinyu Wang
[1] R. Sekar,et al. On the Limits of Information Flow Techniques for Malware Analysis and Containment , 2008, DIMVA.
[2] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[3] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[4] Adi Shamir,et al. Playing "Hide and Seek" with Stored Keys , 1999, Financial Cryptography.
[5] Zhi Wang,et al. ReFormat: Automatic Reverse Engineering of Encrypted Messages , 2009, ESORICS.
[6] Stephan Krenn,et al. Cache Games -- Bringing Access-Based Cache Attacks on AES to Practice , 2011, 2011 IEEE Symposium on Security and Privacy.
[7] Xiangyu Zhang,et al. Automatic Reverse Engineering of Data Structures from Binary Execution , 2010, NDSS.
[8] Gregory R. Andrews,et al. Binary Obfuscation Using Signals , 2007, USENIX Security Symposium.
[9] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[10] Stephen McCamant,et al. Binary Code Extraction and Interface Identification for Security Applications , 2009, NDSS.
[11] Polyglot : Automatic Extraction of Protocol Format using Dynamic Binary Analysis , 2007 .
[12] Christopher Krügel,et al. Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries , 2010, 2010 IEEE Symposium on Security and Privacy.
[13] Heng Yin,et al. Dynamic Spyware Analysis , 2007, USENIX Annual Technical Conference.
[14] Thai Duong,et al. Cryptography in the Web: The Case of Cryptographic Design Flaws in ASP.NET , 2011, 2011 IEEE Symposium on Security and Privacy.
[15] Jakob Jonsson,et al. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1 , 2003, RFC.
[16] Peter Martini,et al. NGBPA Next Generation BotNet Protocol Analysis , 2009, SEC.
[17] Francis Olivier,et al. Electromagnetic Analysis: Concrete Results , 2001, CHES.
[18] Jonathon T. Giffin,et al. Impeding Malware Analysis Using Conditional Code Obfuscation , 2008, NDSS.
[19] Christopher Krügel,et al. Exploring Multiple Execution Paths for Malware Analysis , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[20] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[21] Xuxian Jiang,et al. Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution , 2008, NDSS.
[22] Stephen McCamant,et al. Input generation via decomposition and re-stitching: finding bugs in Malware , 2010, CCS '10.
[23] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[24] James Newsome,et al. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.
[25] Christopher Krügel,et al. Prospex: Protocol Specification Extraction , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[26] Will Drewry,et al. Flayer: Exposing Application Internals , 2007, WOOT.
[27] Li Yang. White Box Cryptography , 2022 .
[28] Dawn Xiaodong Song,et al. Dispatcher: enabling active botnet infiltration using automatic protocol reverse-engineering , 2009, CCS.
[29] Saumya K. Debray,et al. Deobfuscation: reverse engineering obfuscated code , 2005, 12th Working Conference on Reverse Engineering (WCRE'05).
[30] Nicholas Nethercote,et al. Valgrind: a framework for heavyweight dynamic binary instrumentation , 2007, PLDI '07.
[31] Heng Yin,et al. Panorama: capturing system-wide information flow for malware detection and analysis , 2007, CCS '07.
[32] Yongge Wang,et al. Public Key Cryptography Standards: PKCS , 2012, ArXiv.
[33] Amit Sahai,et al. On the (im)possibility of obfuscating programs : (Extended abstract) , 2001, CRYPTO 2001.
[34] Nirwan Ansari,et al. Revealing Packed Malware , 2008, IEEE Security & Privacy.
[35] N. Lutz. Lutz Towards Revealing Attackers ’ Intent by Automatically Decrypting Network Traffic , 2008 .
[36] Saumya K. Debray,et al. Obfuscation of executable code to improve resistance to static disassembly , 2003, CCS '03.
[37] Carsten Willems,et al. Automated Identification of Cryptographic Primitives in Binary Programs , 2011, RAID.
[38] Guofei Gu,et al. TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[39] Christopher Krügel,et al. Identifying Dormant Functionality in Malware Programs , 2010, 2010 IEEE Symposium on Security and Privacy.
[40] Zhenkai Liang,et al. Polyglot: automatic extraction of protocol message format using dynamic binary analysis , 2007, CCS '07.