Flexible and fine-grained mandatory access control on android for diverse security and privacy policies

S Bugiel, S Heuser, AR Sadeghi - 22nd USENIX Security Symposium …, 2013 - usenix.org
In this paper we tackle the challenge of providing a generic security architecture for the
Android OS that can serve as a flexible and effective ecosystem to instantiate different …

Cryptanalysis of the Xiao–Lai white-box AES implementation

Y De Mulder, P Roelse, B Preneel - … , Windsor, ON, Canada, August 15-16 …, 2013 - Springer
In the white-box attack context, ie, the setting where an implementation of a cryptographic
algorithm is executed on an untrusted platform, the adversary has full access to the …

[PDF][PDF] Steal This Movie: Automatically Bypassing DRM Protection in Streaming Media Services.

R Wang, Y Shoshitaishvili, C Kruegel… - USENIX Security …, 2013 - sefcom.asu.edu
Streaming movies online is quickly becoming the way in which users access video
entertainment. This has been powered by the ubiquitous presence of the Internet and the …

Efficient attack to white-box SMS4 implementation

林婷婷, 来学嘉 - Journal of Software, 2013 - jos.org.cn
传统的密码模型都假设密码系统的运行终端和计算环境是可信任的, 但是, 随着攻击方式的发展,
这样的模型显得越来越脆弱. 而白盒攻击环境是指攻击者除了能够获得与传统密码模型同样的 …

Another nail in the coffin of white-box AES implementations

T Lepoint, M Rivain - Cryptology ePrint Archive, 2013 - eprint.iacr.org
The goal of white-box cryptography is to design implementations of common cryptographic
algorithm (eg AES) that remain secure against an attacker with full control of the …

Method and system for obfuscating a cryptographic function

WPAJ Michiels, PMHMA Gorissen - US Patent 8,479,016, 2013 - Google Patents
(57) ABSTRACT A method of protecting an integrity of a data processing system. The
method comprises determining (902) a data string to be protected, an integrity of the data …

[PDF][PDF] 对白盒SMS4 实现的一种有效攻击

林婷婷, 来学嘉 - 软件学报, 2013 - jos.org.cn
传统的密码模型都假设密码系统的运行终端和计算环境是可信任的, 但是, 随着攻击方式的发展,
这样的模型显得越来越脆弱. 而白盒攻击环境是指攻击者除了能够获得与传统密码模型同样的 …

Nislvmp: Improved virtual machine-based software protection

H Wang, D Fang, G Li, X Yin… - 2013 Ninth …, 2013 - ieeexplore.ieee.org
The VM (Virtual Machine)-based software protection technique provides an effective solution
to protect software, making it extremely difficult to analyze and crack. This technique has …

Tamper resistance of a digital data processing unit

WPAJ Michiels, PMHMA Gorissen - US Patent 8,543,835, 2013 - Google Patents
(57) ABSTRACT A system for increasing a tamper resistance of a digital data processing
unit, comprises a first unit (901) comprising pro cessing means (906) for processing the …

Method and system for protecting a cryptography device

M Adjedj - US Patent 8,595,513, 2013 - Google Patents
The method for protecting a cryptography circuit from attacks aiming to discover a secret
datum (D i, K) used during execution by the circuit of a cryptography algorithm comprising …