[인용][C] Post-TV: Piracy, cord-cutting, and the future of television
M Strangelove - 2015 - books.google.com
In the late 2000s, television no longer referred to an object to be watched; it had transformed
into content to be streamed, downloaded, and shared. Tens of millions of viewers have “cut …
into content to be streamed, downloaded, and shared. Tens of millions of viewers have “cut …
Repeatable reverse engineering with PANDA
We present PANDA, an open-source tool that has been purpose-built to support whole
system reverse engineering. It is built upon the QEMU whole system emulator, and so …
system reverse engineering. It is built upon the QEMU whole system emulator, and so …
Flexible end-to-end content security in CCN
Content-centric networking (CCN) project, a flavor of information-centric networking (ICN),
decouples data from its source by shifting the emphasis from hosts and interfaces to …
decouples data from its source by shifting the emphasis from hosts and interfaces to …
HEDGE: efficient traffic classification of encrypted and compressed packets
As the size and source of network traffic increase, so does the challenge of monitoring and
analyzing network traffic. Therefore, sampling algorithms are often used to alleviate these …
analyzing network traffic. Therefore, sampling algorithms are often used to alleviate these …
Angr-the next generation of binary analysis
Software is becoming increasingly more complex, and vul-nerabilities more subtle Better
approaches are required to effectively analyze modern binaries, efficiently identify deeply …
approaches are required to effectively analyze modern binaries, efficiently identify deeply …
Comparison of entropy calculation methods for ransomware encrypted file identification
Ransomware is a malicious class of software that utilises encryption to implement an attack
on system availability. The target's data remains encrypted and is held captive by the …
on system availability. The target's data remains encrypted and is held captive by the …
K-Hunt: Pinpointing insecure cryptographic keys from execution traces
The only secrets in modern cryptography (crypto for short) are the crypto keys.
Understanding how crypto keys are used in a program and discovering insecure keys is …
Understanding how crypto keys are used in a program and discovering insecure keys is …
Automated identification of cryptographic primitives in binary code with data flow graph isomorphism
Softwares use cryptographic algorithms to secure their communications and to protect their
internal data. However the algorithm choice, its implementation design and the generation …
internal data. However the algorithm choice, its implementation design and the generation …
EnCoD: Distinguishing Compressed and Encrypted File Fragments
Reliable identification of encrypted file fragments is a requirement for several security
applications, including ransomware detection, digital forensics, and traffic analysis. A …
applications, including ransomware detection, digital forensics, and traffic analysis. A …
Reliable detection of compressed and encrypted data
Several cybersecurity domains, such as ransomware detection, forensics and data analysis,
require methods to reliably identify encrypted data fragments. Typically, current approaches …
require methods to reliably identify encrypted data fragments. Typically, current approaches …