{"id":"https://openalex.org/W2897859437","doi":"https://doi.org/10.1145/3243734.3243783","title":"K-Hunt","display_name":"K-Hunt","publication_year":2018,"publication_date":"2018-10-15","ids":{"openalex":"https://openalex.org/W2897859437","doi":"https://doi.org/10.1145/3243734.3243783","mag":"2897859437"},"language":"en","primary_location":{"id":"doi:10.1145/3243734.3243783","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3243734.3243783","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020082816","display_name":"Juanru Li","orcid":"https://orcid.org/0000-0002-7978-595X"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Juanru Li","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5026864098","display_name":"Zhiqiang Lin","orcid":"https://orcid.org/0000-0001-6527-5994"},"institutions":[{"id":"https://openalex.org/I52357470","display_name":"The Ohio State University","ror":"https://ror.org/00rs6vg23","country_code":"US","type":"education","lineage":["https://openalex.org/I52357470"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Zhiqiang Lin","raw_affiliation_strings":["The Ohio State University, Columbus, OH, USA"],"affiliations":[{"raw_affiliation_string":"The Ohio State University, Columbus, OH, USA","institution_ids":["https://openalex.org/I52357470"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101938709","display_name":"Juan Caballero","orcid":"https://orcid.org/0000-0003-2962-1348"},"institutions":[{"id":"https://openalex.org/I4210162154","display_name":"IMDEA Software","ror":"https://ror.org/04xvfkh51","country_code":"ES","type":"facility","lineage":["https://openalex.org/I105140100","https://openalex.org/I4210162154"]}],"countries":["ES"],"is_corresponding":false,"raw_author_name":"Juan Caballero","raw_affiliation_strings":["IMDEA Software Institute, Madrid, Spain"],"affiliations":[{"raw_affiliation_string":"IMDEA Software Institute, Madrid, Spain","institution_ids":["https://openalex.org/I4210162154"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112108029","display_name":"Yuanyuan Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuanyuan Zhang","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008204306","display_name":"Dawu Gu","orcid":"https://orcid.org/0000-0002-0504-9538"},"institutions":[{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Dawu Gu","raw_affiliation_strings":["Shanghai Jiao Tong University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5020082816"],"corresponding_institution_ids":["https://openalex.org/I183067930"],"apc_list":null,"apc_paid":null,"fwci":2.1469,"has_fulltext":false,"cited_by_count":31,"citation_normalized_percentile":{"value":0.88583173,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"412","last_page":"425"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6913297176361084},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.6675746440887451},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.5187563896179199},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.44479697942733765},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4438953995704651},{"id":"https://openalex.org/keywords/symmetric-key-algorithm","display_name":"Symmetric-key algorithm","score":0.42664164304733276},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.374217689037323},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.281193345785141},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.21246618032455444},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.13680952787399292}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6913297176361084},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.6675746440887451},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.5187563896179199},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.44479697942733765},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4438953995704651},{"id":"https://openalex.org/C65302260","wikidata":"https://www.wikidata.org/wiki/Q327675","display_name":"Symmetric-key algorithm","level":4,"score":0.42664164304733276},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.374217689037323},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.281193345785141},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.21246618032455444},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.13680952787399292}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3243734.3243783","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3243734.3243783","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W4358824","https://openalex.org/W89505464","https://openalex.org/W126407768","https://openalex.org/W1553308705","https://openalex.org/W1590929875","https://openalex.org/W1965817476","https://openalex.org/W1976476866","https://openalex.org/W1995727142","https://openalex.org/W2008810193","https://openalex.org/W2039433315","https://openalex.org/W2049208027","https://openalex.org/W2065995359","https://openalex.org/W2076745395","https://openalex.org/W2092115639","https://openalex.org/W2097128585","https://openalex.org/W2102970979","https://openalex.org/W2112736324","https://openalex.org/W2112833606","https://openalex.org/W2119812052","https://openalex.org/W2134633067","https://openalex.org/W2136331433","https://openalex.org/W2138788987","https://openalex.org/W2143316545","https://openalex.org/W2145071932","https://openalex.org/W2156453323","https://openalex.org/W2164240796","https://openalex.org/W2168740635","https://openalex.org/W2170894240","https://openalex.org/W2175377689","https://openalex.org/W2269664735","https://openalex.org/W2476042964","https://openalex.org/W2496999134","https://openalex.org/W2670925489","https://openalex.org/W2730172711","https://openalex.org/W2752078705","https://openalex.org/W2761071222","https://openalex.org/W2765671202","https://openalex.org/W2788844568","https://openalex.org/W4232136755","https://openalex.org/W4239813889","https://openalex.org/W4299301436"],"related_works":["https://openalex.org/W2350215162","https://openalex.org/W2382634619","https://openalex.org/W3082967883","https://openalex.org/W254439514","https://openalex.org/W2017125388","https://openalex.org/W328824506","https://openalex.org/W2117915469","https://openalex.org/W4387407403","https://openalex.org/W3170748431","https://openalex.org/W2130871907"],"abstract_inverted_index":{"The":[0],"only":[1],"secrets":[2],"in":[3,19,41,101,136,160],"modern":[4],"cryptography":[5],"(crypto":[6],"for":[7,28,37,51],"short)":[8],"are":[9,17,59,150],"the":[10,46,53,134],"crypto":[11,15,29,49,57,90,103,107,125,169],"keys.":[12,82],"Understanding":[13],"how":[14],"keys":[16,25,40,58,71,100,135,159],"used":[18,96],"a":[20,35],"program":[21],"and":[22,66,80,92,105,113,120,143,176],"discovering":[23],"insecure":[24,39,70,99,158],"is":[26],"paramount":[27],"security.":[30],"This":[31],"paper":[32],"presents":[33],"K-Hunt,":[34],"system":[36],"identifying":[38,52],"binary":[42],"executables.":[43],"K-Hunt":[44,83,112,132,156],"leverages":[45],"properties":[47],"of":[48,163],"operations":[50],"memory":[54],"buffers":[55],"where":[56],"stored.":[60],"And,":[61],"it":[62,115],"tracks":[63],"their":[64],"origin":[65],"propagation":[67],"to":[68,88,97],"identify":[69,89,98],"such":[72,171],"as":[73,172],"deterministically":[74],"generated":[75],"keys,":[76,79],"insecurely":[77],"negotiated":[78],"recoverable":[81],"does":[84],"not":[85],"use":[86],"signatures":[87],"operations,":[91],"thus":[93],"can":[94],"be":[95],"unknown":[102],"algorithms":[104,149],"proprietary":[106],"implementations.":[108],"We":[109],"have":[110],"implemented":[111],"evaluated":[114,165],"with":[116],"10":[117],"cryptographic":[118],"libraries":[119,170],"15":[121],"applications":[122],"that":[123,131],"contain":[124],"operations.":[126],"Our":[127],"evaluation":[128],"results":[129],"demonstrate":[130],"locates":[133],"symmetric":[137],"ciphers,":[138,140,142],"asymmetric":[139],"stream":[141],"digital":[144],"signatures,":[145],"regardless":[146],"if":[147],"those":[148],"standard":[151],"or":[152],"proprietary.":[153],"More":[154],"importantly,":[155],"discovers":[157],"22":[161],"out":[162],"25":[164],"programs":[166],"including":[167],"well-developed":[168],"Libsodium,":[173],"Nettle,":[174],"TomCrypt,":[175],"WolfSSL.":[177]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2018-10-26T00:00:00"}
