{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:57:32Z","timestamp":1772042252456,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,14]],"date-time":"2015-04-14T00:00:00Z","timestamp":1428969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,14]]},"DOI":"10.1145\/2714576.2714639","type":"proceedings-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T16:27:14Z","timestamp":1428078434000},"page":"203-214","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Automated Identification of Cryptographic Primitives in Binary Code with Data Flow Graph Isomorphism"],"prefix":"10.1145","author":[{"given":"Pierre","family":"Lestringant","sequence":"first","affiliation":[{"name":"AMOSSYS, Rennes, France"}]},{"given":"Fr\u00e9d\u00e9ric","family":"Guih\u00e9ry","sequence":"additional","affiliation":[{"name":"AMOSSYS, Rennes, France"}]},{"given":"Pierre-Alain","family":"Fouque","sequence":"additional","affiliation":[{"name":"Universit\u00e9 de Rennes 1 &amp; Institut Universitaire de France, Rennes, France"}]}],"member":"320","published-online":{"date-parts":[[2015,4,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Botan. http:\/\/botan.randombit.net\/.  Botan. http:\/\/botan.randombit.net\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Crypto++. http:\/\/www.cryptopp.com\/.  Crypto++. http:\/\/www.cryptopp.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Openssl. https:\/\/www.openssl.org\/.  Openssl. https:\/\/www.openssl.org\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/6448"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749608.1749612"},{"key":"e_1_3_2_1_6_1","series-title":"Lecture Notes in Computer Science","first-page":"67","volume-title":"Selected Areas in Cryptography","author":"Biryukov A.","year":"2006","unstructured":"A. Biryukov . The design of a stream cipher lex . In E. Biham and A. M. Youssef, editors, Selected Areas in Cryptography , volume 4356 of Lecture Notes in Computer Science , pages 67 -- 75 . Springer , 2006 . A. Biryukov. The design of a stream cipher lex. In E. Biham and A. M. Youssef, editors, Selected Areas in Cryptography, volume 4356 of Lecture Notes in Computer Science, pages 67--75. Springer, 2006."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382217"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1617722"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04722-4"},{"key":"e_1_3_2_1_10_1","unstructured":"T. S. Denis. Libtomcrypt. http:\/\/libtom.org\/.  T. S. Denis. Libtomcrypt. http:\/\/libtom.org\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s001459900025"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44371-2_25"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23644-0_3"},{"key":"e_1_3_2_1_14_1","volume-title":"February","author":"Guilfanov I.","year":"2006","unstructured":"I. Guilfanov . Findcrypt2. http:\/\/www.hexblog.com\/?p=28 , February 2006 . I. Guilfanov. Findcrypt2. http:\/\/www.hexblog.com\/?p=28, February 2006."},{"key":"e_1_3_2_1_15_1","volume-title":"The hash function \"fugue\". IACR Cryptology ePrint Archive","author":"Halevi S.","year":"2014","unstructured":"S. Halevi , W. E. Hall , and C. S. Jutla . The hash function \"fugue\". IACR Cryptology ePrint Archive , 2014 :423, 2014. S. Halevi, W. E. Hall, and C. S. Jutla. The hash function \"fugue\". IACR Cryptology ePrint Archive, 2014:423, 2014."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04138-9_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/646277.687180"},{"key":"e_1_3_2_1_19_1","first-page":"329","volume-title":"Proceedings of the 10th Working Conference on Mining Software Repositories, MSR '13","author":"Khoo W. M.","year":"2013","unstructured":"W. M. Khoo , A. Mycroft , and R. Anderson . Rendezvous: a search engine for binary code. In T. Zimmermann, M. D. Penta, and S. Kim, editors , Proceedings of the 10th Working Conference on Mining Software Repositories, MSR '13 , San Francisco, CA, USA , May 18-19, 2013 , pages 329 -- 338 . IEEE \/ ACM, 2013. W. M. Khoo, A. Mycroft, and R. Anderson. Rendezvous: a search engine for binary code. In T. Zimmermann, M. D. Penta, and S. Kim, editors, Proceedings of the 10th Working Conference on Mining Software Repositories, MSR '13, San Francisco, CA, USA, May 18-19, 2013, pages 329--338. IEEE \/ ACM, 2013."},{"key":"e_1_3_2_1_20_1","volume-title":"ETH Zurich","author":"Lutz N.","year":"2008","unstructured":"N. Lutz . Towards revealing attacker's intent by automatically decrypting network traffic. Master's thesis , ETH Zurich , July 2008 . N. Lutz. Towards revealing attacker's intent by automatically decrypting network traffic. Master's thesis, ETH Zurich, July 2008."},{"key":"e_1_3_2_1_21_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"230","DOI":"10.1007\/3-540-44647-8_14","volume-title":"Advances in Cryptology - CRYPTO","author":"Manger J.","year":"2001","unstructured":"J. Manger . A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1 v2.0. In J. Kilian, editor, Advances in Cryptology - CRYPTO 2001 , 21st Annual International Cryptology Conference, Santa Barbara , California, USA, August 19-23, 2001, Proceedings, volume 2139 of Lecture Notes in Computer Science , pages 230 -- 238 . Springer , 2001. J. Manger. A chosen ciphertext attack on RSA optimal asymmetric encryption padding (OAEP) as standardized in PKCS #1 v2.0. In J. Kilian, editor, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, volume 2139 of Lecture Notes in Computer Science, pages 230--238. Springer, 2001."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74735-2_9"},{"key":"e_1_3_2_1_23_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1007\/978-3-540-24676-3_33","volume-title":"Advances in Cryptology - EUROCRYPT","author":"Nguyen P. Q.","year":"2004","unstructured":"P. Q. Nguyen . Can we trust cryptographic software? cryptographic flaws in GNU privacy guard v1.2.3. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004 , International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, volume 3027 of Lecture Notes in Computer Science , pages 555 -- 570 . Springer , 2004. P. Q. Nguyen. Can we trust cryptographic software? cryptographic flaws in GNU privacy guard v1.2.3. In C. Cachin and J. Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, volume 3027 of Lecture Notes in Computer Science, pages 555--570. Springer, 2004."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1321"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572287"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-009-9049-y"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/321921.321925"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/647087.715705"},{"key":"e_1_3_2_1_29_1","first-page":"687","volume-title":"Steal this movie: Automatically bypassing DRM protection in streaming media services","author":"Wang R.","year":"2013","unstructured":"R. Wang , Y. Shoshitaishvili , C. Kruegel , and G. Vigna . Steal this movie: Automatically bypassing DRM protection in streaming media services . In S. T. King, editor, USENIX Security, pages 687 -- 702 . USENIX Association , 2013 . R. Wang, Y. Shoshitaishvili, C. Kruegel, and G. Vigna. Steal this movie: Automatically bypassing DRM protection in streaming media services. In S. T. King, editor, USENIX Security, pages 687--702. USENIX Association, 2013."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522728"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Z.\n      Wang X.\n      Jiang W.\n      Cui X.\n      Wang and \n      M.\n      Grace\n  . \n  Reformat: Automatic reverse engineering of encrypted messages\n  . In M. Backes and P. Ning editors ESORICS volume \n  5789\n   of \n  Lecture Notes in Computer Science pages \n  200\n  --\n  215\n  . \n  Springer 2009\n  .   Z. Wang X. Jiang W. Cui X. Wang and M. Grace. Reformat: Automatic reverse engineering of encrypted messages. In M. Backes and P. Ning editors ESORICS volume 5789 of Lecture Notes in Computer Science pages 200--215. Springer 2009.","DOI":"10.1007\/978-3-642-04444-1_13"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-58108-1_16"},{"key":"e_1_3_2_1_33_1","volume-title":"Fast collision attack on MD5. IACR Cryptology ePrint Archive","author":"Xie T.","year":"2013","unstructured":"T. Xie , F. Liu , and D. Feng . Fast collision attack on MD5. IACR Cryptology ePrint Archive , 2013 :170, 2013. T. Xie, F. Liu, and D. Feng. Fast collision attack on MD5. IACR Cryptology ePrint Archive, 2013:170, 2013."},{"key":"e_1_3_2_1_34_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1007\/978-3-642-24861-0_13","volume-title":"Detection and analysis of cryptographic data inside software","author":"Zhao R.","year":"2011","unstructured":"R. Zhao , D. Gu , J. Li , and R. Yu . Detection and analysis of cryptographic data inside software . In X. Lai, J. Zhou, and H. Li, editors, Information Security, 14th International Conference, ISC 2011 , Xi'an, China, October 26-29, 2011. Proceedings, volume 7001 of Lecture Notes in Computer Science , pages 182 -- 196 . Springer , 2011. R. Zhao, D. Gu, J. Li, and R. Yu. Detection and analysis of cryptographic data inside software. In X. Lai, J. Zhou, and H. Li, editors, Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings, volume 7001 of Lecture Notes in Computer Science, pages 182--196. Springer, 2011."}],"event":{"name":"ASIA CCS '15: 10th ACM Symposium on Information, Computer and Communications Security","location":"Singapore Republic of Singapore","acronym":"ASIA CCS '15","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2714576.2714639","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2714576.2714639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:54Z","timestamp":1750227414000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2714576.2714639"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,14]]},"references-count":34,"alternative-id":["10.1145\/2714576.2714639","10.1145\/2714576"],"URL":"https:\/\/doi.org\/10.1145\/2714576.2714639","relation":{},"subject":[],"published":{"date-parts":[[2015,4,14]]},"assertion":[{"value":"2015-04-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}