ASIACCS15 / Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism
Softwares use cryptographic algorithms to secure their communications and to protect their internal data. However the algorithm choice, its implementation design […]