<--- Back to Details
First PageDocument Content
Computer programming / Computing / Mathematics / Theoretical computer science / Boolean algebra / Error detection and correction / Compiler construction / Hash function / Avalanche effect / Optimizing compiler / Recursion / MD5
Date: 2017-04-03 15:56:44
Computer programming
Computing
Mathematics
Theoretical computer science
Boolean algebra
Error detection and correction
Compiler construction
Hash function
Avalanche effect
Optimizing compiler
Recursion
MD5

Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping Dongpeng Xu The Pennsylvania State University University Park, USA Email:

Add to Reading List

Source URL: www.ieee-security.org

Download Document from Source Website

File Size: 637,30 KB

Share Document on Facebook

Similar Documents

Electrical engineering / Electromagnetism / Electronic engineering / Electrical components / Field-effect transistor / Transistor / MOSFET / Diode / Power electronics / IC power-supply pin / Gallium nitride / Power MOSFET

Drain Voltage and Avalanche Ratings for GaN FETs Jason Cuadra Application Note AN-0008 Rev. 2.0.2

DocID: 1rbdg - View Document

Geography of the United States / Physical geography / Precipitation / Cirques / Tuckerman Ravine / Pinkham Notch / Huntington Ravine / Avalanche / Tuckerman / Mount Washington / Snow / New Hampshire

General Advisory for Tuckerman Ravine, Saturday, May 23, 2015 A General Advisory is in effect for Tuckerman Ravine until complete melt out in early summer. You will need to do your own snow stability assessments. A new G

DocID: 19dIb - View Document

Snow / Storm / Precipitation / Blizzards / Ice storms / Winter storm / Lake-effect snow / Freezing rain / Avalanche / Meteorology / Atmospheric sciences / Weather

December 2001 Winter Storms The Deceptive Killers

DocID: 17FmV - View Document

Environmental soil science / Geomorphology / Sedimentology / Avalanche / Snow / Till / Rockfall / Debris flow / Glacier / Geology / Earth / Sediments

Eckerstorfer et al., The Cryosphere, Supplementary material Supplementary material to “The geomorphological effect of cornice fall avalanches in the

DocID: 16LSg - View Document

Power analysis / Side channel attack / Message authentication codes / Stream ciphers / Cryptographic hash functions / Differential cryptanalysis / Avalanche effect / VEST / Block cipher modes of operation / Cryptography / Espionage / Advanced Encryption Standard

J Cryptogr Eng:5–27 DOIs13389y REGULAR PAPER Introduction to differential power analysis

DocID: 15HSR - View Document