K-Hunt: Pinpointing Insecure Cryptographic Keys from Execution Traces

In 2018 ACM SIGSAC Conference on Computer and Comm...