K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces.
Juanru LiZhiqiang LinJuan CaballeroYuanyuan ZhangDawu GuPublished in: CCS (2018)
Keyphrases
- execution traces
- secret key
- smart card
- hash functions
- secure communication
- encryption scheme
- key management
- private key
- source code
- digital signature
- authentication scheme
- public key
- diffie hellman
- authentication protocol
- key distribution
- program comprehension
- security analysis
- ciphertext
- security mechanisms
- standard model
- security requirements
- signature scheme
- secret sharing scheme
- database
- artificial intelligence