Research Article

Convolution Neural Network-Based Sensitive Security Parameter Identification and Analysis

Figure 2

Samples of noise sources. The noise source functions were called several times to form each bit stream, and through them, “.bmp” files of in size were made. Although GetTickCount and GetProcessHeap are easy to identify because of their distinct characteristics, it is difficult to tell the difference between CoCreateGuid, CryptGenRandom, and ProcessTimes.