View Document Preview and Link
Document Date: 2013-03-28 20:19:28 Open Document File Size: 242,73 KB Share Result on Facebook
City Chicago / / Company Identifying Inverse Functions / CBC / Intel / Microsoft / the AES / / Country United States / / Currency USD / / / IndustryTerm maximum-flow-minimum-cut algorithm / software security / exploration tools / replay server / antivirus tools / breadth-first search / helper tools / bot software / possible applications / generic server / input processing / constraint solution / Internet-in-a-Workstation environment / identification algorithm / potential applications / generic replay server / input generation applications / software bugs / dynamic symbolic execution tools / encryption algorithms / benign software / law enforcement / web interfaces / Internet-in-a-Workstation We / benign applications / layered input processing / / OperatingSystem XP / Linux / Ubuntu / Microsoft Windows / / Organization Army Research Office / office of Naval Research / National Science Foundation / UC Berkeley / US Federal Reserve / Air Force office of Scientific Research / / Person Stephen McCamant / Dawn Song / / Position Protection General / / Product MegaD / Windows XP / Figure 1 / BitFuzz tool / BitFuzz / / ProgrammingLanguage XML / / ProvinceOrState Illinois / / Technology XML / RAM / encryption algorithms / Linux / block cipher encryption / block cipher / 1 Checksum/hash Algorithm / Operating Systems / identification algorithm / encryption / maximum-flow-minimum-cut algorithm / C&C protocol / DNS / 1307.3 4687.6 84.5 23.1 Decryption Algorithm / MegaD encryption / stream cipher / / SocialTag