Flexible and fine-grained mandatory access control on android for diverse security and privacy policies
In this paper we tackle the challenge of providing a generic security architecture for the
Android OS that can serve as a flexible and effective ecosystem to instantiate different …
Android OS that can serve as a flexible and effective ecosystem to instantiate different …
Cryptanalysis of the Xiao–Lai white-box AES implementation
Y De Mulder, P Roelse, B Preneel - … , Windsor, ON, Canada, August 15-16 …, 2013 - Springer
In the white-box attack context, ie, the setting where an implementation of a cryptographic
algorithm is executed on an untrusted platform, the adversary has full access to the …
algorithm is executed on an untrusted platform, the adversary has full access to the …
[PDF][PDF] Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services.
Streaming movies online is quickly becoming the way in which users access video
entertainment. This has been powered by the ubiquitous presence of the Internet and the …
entertainment. This has been powered by the ubiquitous presence of the Internet and the …
Efficient attack to white-box SMS4 implementation
林婷婷, 来学嘉 - Journal of Software, 2013 - jos.org.cn
传统的密码模型都假设密码系统的运行终端和计算环境是可信任的, 但是, 随着攻击方式的发展,
这样的模型显得越来越脆弱. 而白盒攻击环境是指攻击者除了能够获得与传统密码模型同样的 …
这样的模型显得越来越脆弱. 而白盒攻击环境是指攻击者除了能够获得与传统密码模型同样的 …
Another nail in the coffin of white-box AES implementations
The goal of white-box cryptography is to design implementations of common cryptographic
algorithm (eg AES) that remain secure against an attacker with full control of the …
algorithm (eg AES) that remain secure against an attacker with full control of the …
Method and system for obfuscating a cryptographic function
WPAJ Michiels, PMHMA Gorissen - US Patent 8,479,016, 2013 - Google Patents
(57) ABSTRACT A method of protecting an integrity of a data processing system. The
method comprises determining (902) a data string to be protected, an integrity of the data …
method comprises determining (902) a data string to be protected, an integrity of the data …
[PDF][PDF] 对白盒SMS4 实现的一种有效攻击
林婷婷, 来学嘉 - 软件学报, 2013 - jos.org.cn
传统的密码模型都假设密码系统的运行终端和计算环境是可信任的, 但是, 随着攻击方式的发展,
这样的模型显得越来越脆弱. 而白盒攻击环境是指攻击者除了能够获得与传统密码模型同样的 …
这样的模型显得越来越脆弱. 而白盒攻击环境是指攻击者除了能够获得与传统密码模型同样的 …
Nislvmp: Improved virtual machine-based software protection
H Wang, D Fang, G Li, X Yin… - 2013 Ninth …, 2013 - ieeexplore.ieee.org
The VM (Virtual Machine)-based software protection technique provides an effective solution
to protect software, making it extremely difficult to analyze and crack. This technique has …
to protect software, making it extremely difficult to analyze and crack. This technique has …
Tamper resistance of a digital data processing unit
WPAJ Michiels, PMHMA Gorissen - US Patent 8,543,835, 2013 - Google Patents
(57) ABSTRACT A system for increasing a tamper resistance of a digital data processing
unit, comprises a first unit (901) comprising pro cessing means (906) for processing the …
unit, comprises a first unit (901) comprising pro cessing means (906) for processing the …
Method and system for protecting a cryptography device
M Adjedj - US Patent 8,595,513, 2013 - Google Patents
The method for protecting a cryptography circuit from attacks aiming to discover a secret
datum (D i, K) used during execution by the circuit of a cryptography algorithm comprising …
datum (D i, K) used during execution by the circuit of a cryptography algorithm comprising …