When doing reverse analysis of program’s binary codes, it is often to encounter the function of cryptographic library. In order to reduce workload, a cryptographic library model has been designed by analysts. Models use formalized approach to describe the frame of cryptology and the structure of cryptographic function, complete the mapping from cryptographic function property to its architecture, and accomplish the result presentation of data analysis and mapping at last. The model can solve two problems: the first one is to know the hierarchy of the cryptographic function in the library well; the second one is to know some kinds of information, such as related cryptology algorithm and protocol, etc. These function implements can display the result graphically. The model can find relevant knowledge for the analysts automatically and rapidly, which is helpful to the learning of the overall abstract structure of cryptology.
 Dwivedi, A., Dwivedi, A., Kumar, S., et al. (2013) A Cryptographic Algorithm Analysis for Security Threats of Semantic E-Commerce Web (SECW) for Electronic Payment Transaction System. Advances in Computing and Information Technology, Springer Berlin Heidelberg, 367-379. http://dx.doi.org/10.1007/978-3-642-31600-5_36
 Halderman, J.A., Schoen, S.D., Heninger, N., et al. (2009) Lest We Remember: Cold-Boot Attacks on Encryption Keys. Communications of the ACM, 52, 91-98. http://dx.doi.org/10.1145/1506409.1506429
 Guilfanov, I. (2015) FLIRT: Fast Library Acquisition for Identification and Recognition. https://www.hex-rays.com/products/ida/tech/flirt/in_depth.shtml
 Nethercote, N. and Seward, J. (2007) Valgrind: A Architecture for Heavyweight Dynamic Binary Instrumentation. ACM SIGPLAN Notices, 42, 89-100. http://dx.doi.org/10.1145/1273442.1250746
 Gr?bert, F., Willems, C. and Holz, T. (2011) Automated Identification of Cryptographic Primitives in Binary Programs: Recent Advances in Intrusion Detection. Berlin: Springer Berlin Heidelberg, 41-60.