A survey of android application and malware hardening

V Sihag, M Vardhan, P Singh - Computer Science Review, 2021 - Elsevier
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …

Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

Flexible and fine-grained mandatory access control on android for diverse security and privacy policies

S Bugiel, S Heuser, AR Sadeghi - 22nd USENIX Security Symposium …, 2013 - usenix.org
In this paper we tackle the challenge of providing a generic security architecture for the
Android OS that can serve as a flexible and effective ecosystem to instantiate different …

White-box cryptography and an AES implementation

S Chow, P Eisen, H Johnson… - Selected Areas in …, 2003 - Springer
Conventional software implementations of cryptographic algorithms are totally insecure
where a hostile user may control the execution environment, or where co-located with …

Cryptanalysis of a white box AES implementation

O Billet, H Gilbert, C Ech-Chatbi - … SAC 2004, Waterloo, Canada, August 9 …, 2005 - Springer
The white box attack context as described in [1, 2] is the common setting where
cryptographic software is executed in an untrusted environment—ie an attacker has gained …

Differential computation analysis: Hiding your white-box designs is not enough

JW Bos, C Hubain, W Michiels, P Teuwen - … , CA, USA, August 17-19, 2016 …, 2016 - Springer
Although all current scientific white-box approaches of standardized cryptographic primitives
are broken, there is still a large number of companies which sell “secure” white-box …

Positive results and techniques for obfuscation

B Lynn, M Prabhakaran, A Sahai - … on the theory and applications of …, 2004 - Springer
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program
P into a new program (P) with the same functionality as P, but such that O(P) protects any …

Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key

A Biryukov, C Bouillaguet, D Khovratovich - Advances in Cryptology …, 2014 - Springer
In this paper we pick up an old challenge to design public key or white-box constructions
from symmetric cipher components. We design several encryption schemes based on the …

Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer

R Verdult, FD Garcia, B Ege - Supplement to the Proceedings of 22nd …, 2015 - usenix.org
The Megamos Crypto transponder is used in one of the most widely deployed electronic
vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and …

Protecting white-box AES with dual ciphers

M Karroumi - Information Security and Cryptology-ICISC 2010: 13th …, 2011 - Springer
In order to protect AES software running on untrusted platforms, Chow et al.(2002) designed
a white-box implementation. However, Billet et al.(2004) showed that the secret key can be …