A survey of android application and malware hardening
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …
threat to individuals, societies and nations. Anti-malware companies are often the first and …
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …
theoretical results indicate that provably secure obfuscation in general is impossible, its …
Flexible and fine-grained mandatory access control on android for diverse security and privacy policies
In this paper we tackle the challenge of providing a generic security architecture for the
Android OS that can serve as a flexible and effective ecosystem to instantiate different …
Android OS that can serve as a flexible and effective ecosystem to instantiate different …
White-box cryptography and an AES implementation
S Chow, P Eisen, H Johnson… - Selected Areas in …, 2003 - Springer
Conventional software implementations of cryptographic algorithms are totally insecure
where a hostile user may control the execution environment, or where co-located with …
where a hostile user may control the execution environment, or where co-located with …
Cryptanalysis of a white box AES implementation
The white box attack context as described in [1, 2] is the common setting where
cryptographic software is executed in an untrusted environment—ie an attacker has gained …
cryptographic software is executed in an untrusted environment—ie an attacker has gained …
Differential computation analysis: Hiding your white-box designs is not enough
Although all current scientific white-box approaches of standardized cryptographic primitives
are broken, there is still a large number of companies which sell “secure” white-box …
are broken, there is still a large number of companies which sell “secure” white-box …
Positive results and techniques for obfuscation
Informally, an obfuscator O is an efficient, probabilistic “compiler” that transforms a program
P into a new program (P) with the same functionality as P, but such that O(P) protects any …
P into a new program (P) with the same functionality as P, but such that O(P) protects any …
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key
In this paper we pick up an old challenge to design public key or white-box constructions
from symmetric cipher components. We design several encryption schemes based on the …
from symmetric cipher components. We design several encryption schemes based on the …
Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer
The Megamos Crypto transponder is used in one of the most widely deployed electronic
vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and …
vehicle immobilizers. It is used among others in most Audi, Fiat, Honda, Volkswagen and …
Protecting white-box AES with dual ciphers
M Karroumi - Information Security and Cryptology-ICISC 2010: 13th …, 2011 - Springer
In order to protect AES software running on untrusted platforms, Chow et al.(2002) designed
a white-box implementation. However, Billet et al.(2004) showed that the secret key can be …
a white-box implementation. However, Billet et al.(2004) showed that the secret key can be …