[인용][C] Post-TV: Piracy, cord-cutting, and the future of television

M Strangelove - 2015 - books.google.com
In the late 2000s, television no longer referred to an object to be watched; it had transformed
into content to be streamed, downloaded, and shared. Tens of millions of viewers have “cut …

Repeatable reverse engineering with PANDA

B Dolan-Gavitt, J Hodosh, P Hulin, T Leek… - Proceedings of the 5th …, 2015 - dl.acm.org
We present PANDA, an open-source tool that has been purpose-built to support whole
system reverse engineering. It is built upon the QEMU whole system emulator, and so …

Flexible end-to-end content security in CCN

CA Wood, E Uzun - 2014 IEEE 11th Consumer …, 2014 - ieeexplore.ieee.org
Content-centric networking (CCN) project, a flavor of information-centric networking (ICN),
decouples data from its source by shifting the emphasis from hosts and interfaces to …

HEDGE: efficient traffic classification of encrypted and compressed packets

F Casino, KKR Choo, C Patsakis - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
As the size and source of network traffic increase, so does the challenge of monitoring and
analyzing network traffic. Therefore, sampling algorithms are often used to alleviate these …

Angr-the next generation of binary analysis

F Wang, Y Shoshitaishvili - 2017 IEEE Cybersecurity …, 2017 - ieeexplore.ieee.org
Software is becoming increasingly more complex, and vul-nerabilities more subtle Better
approaches are required to effectively analyze modern binaries, efficiently identify deeply …

Comparison of entropy calculation methods for ransomware encrypted file identification

SR Davies, R Macfarlane, WJ Buchanan - Entropy, 2022 - mdpi.com
Ransomware is a malicious class of software that utilises encryption to implement an attack
on system availability. The target's data remains encrypted and is held captive by the …

K-Hunt: Pinpointing insecure cryptographic keys from execution traces

J Li, Z Lin, J Caballero, Y Zhang, D Gu - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
The only secrets in modern cryptography (crypto for short) are the crypto keys.
Understanding how crypto keys are used in a program and discovering insecure keys is …

Automated identification of cryptographic primitives in binary code with data flow graph isomorphism

P Lestringant, F Guihéry, PA Fouque - … of the 10th ACM Symposium on …, 2015 - dl.acm.org
Softwares use cryptographic algorithms to secure their communications and to protect their
internal data. However the algorithm choice, its implementation design and the generation …

EnCoD: Distinguishing Compressed and Encrypted File Fragments

F De Gaspari, D Hitaj, G Pagnotta, L De Carli… - Network and System …, 2020 - Springer
Reliable identification of encrypted file fragments is a requirement for several security
applications, including ransomware detection, digital forensics, and traffic analysis. A …

Reliable detection of compressed and encrypted data

F De Gaspari, D Hitaj, G Pagnotta, L De Carli… - Neural Computing and …, 2022 - Springer
Several cybersecurity domains, such as ransomware detection, forensics and data analysis,
require methods to reliably identify encrypted data fragments. Typically, current approaches …