Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

Differential computation analysis: Hiding your white-box designs is not enough

JW Bos, C Hubain, W Michiels, P Teuwen - … , CA, USA, August 17-19, 2016 …, 2016 - Springer
Although all current scientific white-box approaches of standardized cryptographic primitives
are broken, there is still a large number of companies which sell “secure” white-box …

Towards practical whitebox cryptography: optimizing efficiency and space hardness

A Bogdanov, T Isobe, E Tischhauser - … on the Theory and Application of …, 2016 - Springer
Whitebox cryptography aims to provide security for cryptographic algorithms in an untrusted
environment where the adversary has full access to their implementation. Typical security …

Efficient and provable white-box primitives

PA Fouque, P Karpman, P Kirchner… - … Conference on the Theory …, 2016 - Springer
In recent years there have been several attempts to build white-box block ciphers whose
implementations aim to be incompressible. This includes the weak white-box ASASA …

Indifferentiability of confusion-diffusion networks

Y Dodis, M Stam, J Steinberger, T Liu - … on the Theory and Applications of …, 2016 - Springer
We show the first positive results for the indifferentiability security of the confusion-diffusion
networks (which are extensively used in the design of block ciphers and hash functions). In …

White-box AES implementation revisited

CH Baek, JH Cheon, H Hong - Journal of Communications and …, 2016 - ieeexplore.ieee.org
White-box cryptography presented by Chow et al. is an obfuscation technique for protecting
secret keys in software implementations even if an adversary has full access to the …

White-Box Cryptography in the Gray Box: –A Hardware Implementation and its Side Channels–

P Sasdrich, A Moradi, T Güneysu - … 2016, Bochum, Germany, March 20-23 …, 2016 - Springer
Implementations of white-box cryptography aim to protect a secret key in a white-box
environment in which an adversary has full control over the execution process and the entire …

An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices

Y Shi, W Wei, Z He, H Fan - Proceedings of the 32nd annual conference …, 2016 - dl.acm.org
Embedded devices with constrained computational resources, such as wireless sensor
network nodes, electronic tag readers, roadside units in vehicular networks, and smart …

There is wisdom in harnessing the strengths of your enemy: Customized encoding to thwart side-channel attacks

H Maghrebi, V Servant, J Bringer - … 2016, Bochum, Germany, March 20-23 …, 2016 - Springer
Side-channel attacks are an important concern for the security of cryptographic algorithms.
To counteract it, a recent line of research has investigated the use of software encoding …

Copker: a cryptographic engine against cold-boot attacks

L Guan, J Lin, Z Ma, B Luo, L Xia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Cryptosystems are essential for computer and communication security, eg, RSA or ECDSA
in PGP Email clients and AES in full disk encryption. In practice, the cryptographic keys are …