A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images

Abdel Alim Kamal, Roger Zahno, Amr M. Youssef. A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images. In Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu, Alfredo Cuzzocrea, Christian Kittl, Dimitris E. Simos, Edgar Weippl, Lida Xu, editors, Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings. Volume 8128 of Lecture Notes in Computer Science, pages 75-90, Springer, 2013. [doi]

@inproceedings{KamalZY13-0,
  title = {A Comparison between Two Off-the-Shelf Algebraic Tools for Extraction of Cryptographic Keys from Corrupted Memory Images},
  author = {Abdel Alim Kamal and Roger Zahno and Amr M. Youssef},
  year = {2013},
  doi = {10.1007/978-3-642-40588-4_6},
  url = {http://dx.doi.org/10.1007/978-3-642-40588-4_6},
  researchr = {https://researchr.org/publication/KamalZY13-0},
  cites = {0},
  citedby = {0},
  pages = {75-90},
  booktitle = {Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings},
  editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar Weippl and Lida Xu and Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar Weippl and Lida Xu},
  volume = {8128},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-642-40587-7},
}