Protecting software through obfuscation: Can it keep pace with progress in code analysis?
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …
theoretical results indicate that provably secure obfuscation in general is impossible, its …
Differential computation analysis: Hiding your white-box designs is not enough
Although all current scientific white-box approaches of standardized cryptographic primitives
are broken, there is still a large number of companies which sell “secure” white-box …
are broken, there is still a large number of companies which sell “secure” white-box …
Towards practical whitebox cryptography: optimizing efficiency and space hardness
Whitebox cryptography aims to provide security for cryptographic algorithms in an untrusted
environment where the adversary has full access to their implementation. Typical security …
environment where the adversary has full access to their implementation. Typical security …
Efficient and provable white-box primitives
In recent years there have been several attempts to build white-box block ciphers whose
implementations aim to be incompressible. This includes the weak white-box ASASA …
implementations aim to be incompressible. This includes the weak white-box ASASA …
Indifferentiability of confusion-diffusion networks
We show the first positive results for the indifferentiability security of the confusion-diffusion
networks (which are extensively used in the design of block ciphers and hash functions). In …
networks (which are extensively used in the design of block ciphers and hash functions). In …
White-box AES implementation revisited
White-box cryptography presented by Chow et al. is an obfuscation technique for protecting
secret keys in software implementations even if an adversary has full access to the …
secret keys in software implementations even if an adversary has full access to the …
White-Box Cryptography in the Gray Box: –A Hardware Implementation and its Side Channels–
Implementations of white-box cryptography aim to protect a secret key in a white-box
environment in which an adversary has full control over the execution process and the entire …
environment in which an adversary has full control over the execution process and the entire …
An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices
Embedded devices with constrained computational resources, such as wireless sensor
network nodes, electronic tag readers, roadside units in vehicular networks, and smart …
network nodes, electronic tag readers, roadside units in vehicular networks, and smart …
There is wisdom in harnessing the strengths of your enemy: Customized encoding to thwart side-channel attacks
H Maghrebi, V Servant, J Bringer - … 2016, Bochum, Germany, March 20-23 …, 2016 - Springer
Side-channel attacks are an important concern for the security of cryptographic algorithms.
To counteract it, a recent line of research has investigated the use of software encoding …
To counteract it, a recent line of research has investigated the use of software encoding …
Copker: a cryptographic engine against cold-boot attacks
Cryptosystems are essential for computer and communication security, eg, RSA or ECDSA
in PGP Email clients and AES in full disk encryption. In practice, the cryptographic keys are …
in PGP Email clients and AES in full disk encryption. In practice, the cryptographic keys are …