Differential computation analysis: Hiding your white-box designs is not enough
Although all current scientific white-box approaches of standardized cryptographic primitives
are broken, there is still a large number of companies which sell “secure” white-box …
are broken, there is still a large number of companies which sell “secure” white-box …
Application-level security for ROS-based applications
While the topic of security in industrial applications has gained some momentum in recent
years, there are still severe security vulnerabilities which are actively exploited for attacks …
years, there are still severe security vulnerabilities which are actively exploited for attacks …
Two attacks on a white-box AES implementation
White-box cryptography aims to protect the secret key of a cipher in an environment in which
an adversary has full access to the implementation of the cipher and its execution …
an adversary has full access to the implementation of the cipher and its execution …
Analysis of software countermeasures for whitebox encryption
Whitebox cryptography aims to ensure the security of cryptographic algorithms in the
whitebox model where the adversary has full access to the execution environment. To attain …
whitebox model where the adversary has full access to the execution environment. To attain …
[HTML][HTML] White-box cryptography: don't forget about grey-box attacks
Despite the fact that all current scientific white-box approaches of standardized
cryptographic primitives have been publicly broken, these attacks require knowledge of the …
cryptographic primitives have been publicly broken, these attacks require knowledge of the …
A masked white-box cryptographic implementation for protecting against differential computation analysis
S Lee, T Kim, Y Kang - IEEE Transactions on Information …, 2018 - ieeexplore.ieee.org
Recently, gray-box attacks on white-box cryptographic implementations have succeeded.
These attacks are more efficient than white-box attacks because they can be performed …
These attacks are more efficient than white-box attacks because they can be performed …
On the ineffectiveness of internal encodings-revisiting the DCA attack on white-box cryptography
E Alpirez Bock, C Brzuska, W Michiels… - Applied Cryptography and …, 2018 - Springer
The goal of white-box cryptography is to implement cryptographic algorithms securely in
software in the presence of an adversary that has complete access to the software's program …
software in the presence of an adversary that has complete access to the software's program …
Obfuscation with Mixed Boolean-Arithmetic Expressions: reconstruction, analysis and simplification tools
N Eyrolles - 2017 - theses.hal.science
Software obfuscation is a software protection technique thattransforms code in order to make
its analysis more difficult. MixedBoolean-Arithmetic (MBA) expressions are presented as a …
its analysis more difficult. MixedBoolean-Arithmetic (MBA) expressions are presented as a …
White-Box Cryptography in the Gray Box: –A Hardware Implementation and its Side Channels–
Implementations of white-box cryptography aim to protect a secret key in a white-box
environment in which an adversary has full control over the execution process and the entire …
environment in which an adversary has full control over the execution process and the entire …
Secure machine executable code deployment and execution method and system
B Couillard, BC Ritchie, JR Goodman… - US Patent 10,678,525, 2020 - Google Patents
Described are various embodiments of a machine executable code deployment method and
system. In one such embodiment, a machine executable code deployment method is …
system. In one such embodiment, a machine executable code deployment method is …