Search For:

Displaying 1-2 out of 2 total
CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution
Found in: IEEE Transactions on Dependable and Secure Computing
By Xin Li,Xinyuan Wang,Wentao Chang
Issue Date:March 2014
pp. 101-114
Malwares are becoming increasingly stealthy, more and more malwares are using cryptographic algorithms (e.g., packing, encrypting C&C communication) to protect themselves from being analyzed. The use of cryptographic algorithms and truly transie...
Sampling-based program locality approximation
Found in: Proceedings of the 7th international symposium on Memory management (ISMM '08)
By Wentao Chang, Yutao Zhong
Issue Date:June 2008
pp. 3-3
Reuse signature, or reuse distance pattern, is an accurate model for program memory accessing behaviors. It has been studied and shown to be effective in program analysis and optimizations by many recent works. However, the high overhead associated with re...