FirmCCF: Detecting Custom Cryptographic Function Vulnerabilities Through Query-driven Approaches

Cryptographic techniques are widely used to safeguard software against privacy breaches. Efficiently detecting encryption algorithms in software to determine whether they meet security requirements is a critical task. However, traditional static and dynamic detection methods often suffer from high f...

Full description

Saved in:
Bibliographic Details
Published in:IEEE internet of things journal p. 1
Main Authors: Huang, Jing, Chen, Jiongyi, Wang, Min, Hu, Yupeng
Format: Journal Article
Language:English
Published: IEEE 2025
Subjects:
ISSN:2327-4662, 2327-4662
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first