Login / Signup
CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution.
Xin Li
Xinyuan Wang
Wentao Chang
Published in:
IEEE Trans. Dependable Secur. Comput. (2014)
Keyphrases
</>
boolean operations
steady state
logical operations
data sets
concurrent processes
application programs
real time
smart card
data flow
parallel execution
website
multiscale
cellular automata
cryptographic protocols
execution model
concurrent execution