Differential computation analysis: Hiding your white-box designs is not enough

JW Bos, C Hubain, W Michiels, P Teuwen - … , CA, USA, August 17-19, 2016 …, 2016 - Springer
Although all current scientific white-box approaches of standardized cryptographic primitives
are broken, there is still a large number of companies which sell “secure” white-box …

Application-level security for ROS-based applications

B Dieber, S Kacianka, S Rass… - 2016 IEEE/RSJ …, 2016 - ieeexplore.ieee.org
While the topic of security in industrial applications has gained some momentum in recent
years, there are still severe security vulnerabilities which are actively exploited for attacks …

Two attacks on a white-box AES implementation

T Lepoint, M Rivain, Y De Mulder, P Roelse… - … conference on selected …, 2013 - Springer
White-box cryptography aims to protect the secret key of a cipher in an environment in which
an adversary has full access to the implementation of the cipher and its execution …

Analysis of software countermeasures for whitebox encryption

S Banik, A Bogdanov, T Isobe, MB Jepsen - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Whitebox cryptography aims to ensure the security of cryptographic algorithms in the
whitebox model where the adversary has full access to the execution environment. To attain …

[HTML][HTML] White-box cryptography: don't forget about grey-box attacks

E Alpirez Bock, JW Bos, C Brzuska, C Hubain… - Journal of …, 2019 - Springer
Despite the fact that all current scientific white-box approaches of standardized
cryptographic primitives have been publicly broken, these attacks require knowledge of the …

A masked white-box cryptographic implementation for protecting against differential computation analysis

S Lee, T Kim, Y Kang - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Recently, gray-box attacks on white-box cryptographic implementations have succeeded.
These attacks are more efficient than white-box attacks because they can be performed …

On the ineffectiveness of internal encodings-revisiting the DCA attack on white-box cryptography

E Alpirez Bock, C Brzuska, W Michiels… - Applied Cryptography and …, 2018 - Springer
The goal of white-box cryptography is to implement cryptographic algorithms securely in
software in the presence of an adversary that has complete access to the software's program …

Obfuscation with Mixed Boolean-Arithmetic Expressions: reconstruction, analysis and simplification tools

N Eyrolles - 2017 - theses.hal.science
Software obfuscation is a software protection technique thattransforms code in order to make
its analysis more difficult. MixedBoolean-Arithmetic (MBA) expressions are presented as a …

White-Box Cryptography in the Gray Box: –A Hardware Implementation and its Side Channels–

P Sasdrich, A Moradi, T Güneysu - … 2016, Bochum, Germany, March 20-23 …, 2016 - Springer
Implementations of white-box cryptography aim to protect a secret key in a white-box
environment in which an adversary has full control over the execution process and the entire …

Secure machine executable code deployment and execution method and system

B Couillard, BC Ritchie, JR Goodman… - US Patent 10,678,525, 2020 - Google Patents
Described are various embodiments of a machine executable code deployment method and
system. In one such embodiment, a machine executable code deployment method is …