CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution

Xin Li, Xinyuan Wang, Wentao Chang. CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution. IEEE Trans. Dependable Sec. Comput., 11(2):101-114, 2014. [doi]

@article{LiWC14-0,
  title = {CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution},
  author = {Xin Li and Xinyuan Wang and Wentao Chang},
  year = {2014},
  doi = {10.1109/TDSC.2012.83},
  url = {http://doi.ieeecomputersociety.org/10.1109/TDSC.2012.83},
  researchr = {https://researchr.org/publication/LiWC14-0},
  cites = {0},
  citedby = {0},
  journal = {IEEE Trans. Dependable Sec. Comput.},
  volume = {11},
  number = {2},
  pages = {101-114},
}