Deciphering Malware's use of TLS (without Decryption).
Blake AndersonSubharthi PaulDavid A. McGrewPublished in: CoRR (2016)
Keyphrases
- malware detection
- reverse engineering
- parameter estimation
- encryption algorithm
- secret key
- detect malicious
- malicious code
- dynamic analysis
- encryption scheme
- control flow
- static analysis
- ciphertext
- secure communication
- unauthorized access
- information retrieval
- machine learning
- real time
- public key
- open source
- encryption decryption