Abstract. Identifying that a given binary program implements a spe-cific cryptographic algorithm and finding out more information about the cryptographic code is an important problem. Proprietary programs and especially malicious software (so called malware) often use cryptography and we want to learn more about the context, e.g., which algorithms and keys are used by the program. This helps an analyst to quickly under-stand what a given binary program does and eases analysis. In this paper, we present several methods to identify cryptographic prim-itives (e.g., entire algorithms or only keys) within a given binary program in an automated way. We perform fine-grained dynamic binary analysis and use the collected information as input for sev...
Les logiciels informatiques manipulent fréquemment des données secrètes, garantissant généralement l...
Currently, software organizations face critical issues associated with computer security, considerin...
This thesis covers the topic of automatic detection of cryptography used in application code, which ...
Cette thèse traite de la conception de méthodes automatisées ou semi-automatisées pour détecter et i...
Finding and extracting crypto algorithms in binary code is often a tedious reverse engineering task....
Finding and identifying Cryptography is a growing concern in the malware analysis community. In this...
In this paper we present a new approach for identify-ing the crypto routines in different types of m...
Abstract—Malwares are becoming increasingly stealthy, more and more malwares are using cryptographic...
Abstract—As promising results have been obtained in de-feating code obfuscation techniques, malware ...
This thesis is about the design of automatic or semi-automatic methods to detect and identify crypto...
Abstract. Fighting against computer malware require a mandatory step of reverse engineering. As soon...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
Abstract This article deals with operational attacks leaded against cryptographic tools. Problem is ...
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-level,...
Currently, software organizations face critical issues associated with computer security, considerin...
Les logiciels informatiques manipulent fréquemment des données secrètes, garantissant généralement l...
Currently, software organizations face critical issues associated with computer security, considerin...
This thesis covers the topic of automatic detection of cryptography used in application code, which ...
Cette thèse traite de la conception de méthodes automatisées ou semi-automatisées pour détecter et i...
Finding and extracting crypto algorithms in binary code is often a tedious reverse engineering task....
Finding and identifying Cryptography is a growing concern in the malware analysis community. In this...
In this paper we present a new approach for identify-ing the crypto routines in different types of m...
Abstract—Malwares are becoming increasingly stealthy, more and more malwares are using cryptographic...
Abstract—As promising results have been obtained in de-feating code obfuscation techniques, malware ...
This thesis is about the design of automatic or semi-automatic methods to detect and identify crypto...
Abstract. Fighting against computer malware require a mandatory step of reverse engineering. As soon...
With the growing popularity of emerging technologies, the prevalence of digital systems is more than...
Abstract This article deals with operational attacks leaded against cryptographic tools. Problem is ...
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-level,...
Currently, software organizations face critical issues associated with computer security, considerin...
Les logiciels informatiques manipulent fréquemment des données secrètes, garantissant généralement l...
Currently, software organizations face critical issues associated with computer security, considerin...
This thesis covers the topic of automatic detection of cryptography used in application code, which ...