Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Reference :

    1. Xin Li, Xinyuan Wang, Wentao Chang, “CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution” IEEE Transactions on Dependable and Secure computing, vol. 11, no. 2, March/April 2014
    2. A. Shamir and N. van Someren. Playing Hide and Seek with Stored Keys. In Proceedings of the Third International Conference on Financial Cryptography (FC 1999), pages 118 – 124, February 1999.
    3. T. Pettersson. Cryptographic Key Recovery from Linux Memory Dumps.In Presentation, Chaos Communication Camp, August 2007
    4. J. A. Halderman, S. D. Schoen, N. Heninger, W. Clarkson, W. Paul, J. A. Calandrino, A. J. Feldman, J. Appelbaum, and E. W. Felten. Lest We Remember: Cold Boot Attacks on Encryption Keys. In Proceedings of the 17th USENIX Security Symposium, pages 45–60. USENIX, August 2008
    5. Z. Wang, X. Jiang, W. Cui, X. Wang, and M. Grace. ReFormat: Automatic Reverse Engineering of Encrypted Messages. In Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), pages 200–215, September 2009
    6. F. Gr¨obert, C. Willems, and T. Holz. Automated Identification of Cryptographic Primitives in Binary Programs. In Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (RAID 2011), September 2011.
    7. J. Caballero, P. Poosankam, C. Kreibich, and D. Song. Dispatcher: Enabling Active Botnet Infiltration using Automatic Protocol Reverse engineering. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), pages 621–634. ACM, October 2009

Recent Article