Login / Signup
Deciphering malware's use of TLS (without decryption).
Blake Anderson
Subharthi Paul
David A. McGrew
Published in:
J. Comput. Virol. Hacking Tech. (2018)
Keyphrases
</>
data mining
malware detection
reverse engineering
encryption scheme
parameter estimation
real world
encryption algorithm
control flow
detect malicious
static analysis
secret key
malicious code
dynamic analysis
real time
secure communication
ciphertext
similarity measure
image sequences
knowledge base
data sets