View Document Preview and Link
Document Date: 2008-01-28 08:33:00 Open Document File Size: 1,64 MB Share Result on Facebook
City Milano / / Company AES / / Country United States / Italy / / / Facility College of Computing / Georgia Institute of Technology / / IndustryTerm informed key search attacks / compiler infrastructure / compiler-level tool / call-site / binary modification tool / program analysis algorithms / obfuscation tool / particular applications / anti-virus tools / applicable tool / search space / encryption algorithm / user level tools / search time / / OperatingSystem Linux / Microsoft Windows / / Organization Andrea Lanzi2 Wenke Lee1 School of Computer Science / Georgia Institute of Technology / Brute Force / U.S. Securities and Exchange Commission / College of Computing / / Position candidate for obfuscation / malware writer / malware analyst / malware author / representative / General / / Product DynInst / Key(X) / / ProgrammingLanguage C / C++ / / Technology 3.2 Encryption / encryption / program analysis algorithms / symmetric encryption / peer-to-peer / encryption algorithm / Linux / API / block cipher / code blocks needing encryption / P2P / code block needing encryption / Performing encryption / UDP / / SocialTag