A survey of android application and malware hardening
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …
threat to individuals, societies and nations. Anti-malware companies are often the first and …
Protecting software through obfuscation: Can it keep pace with progress in code analysis?
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …
theoretical results indicate that provably secure obfuscation in general is impossible, its …
SoK of used cryptography in blockchain
The underlying fundaments of blockchain are cryptography and cryptographic concepts that
provide reliable and secure decentralized solutions. Although many recent papers study the …
provide reliable and secure decentralized solutions. Although many recent papers study the …
Obfuscator-LLVM--software protection for the masses
P Junod, J Rinaldini, J Wehrli… - 2015 ieee/acm 1st …, 2015 - ieeexplore.ieee.org
Software security with respect to reverse-engineering is a challenging discipline that has
been researched for several years and which is still active. At the same time, this field is …
been researched for several years and which is still active. At the same time, this field is …
A white-box DES implementation for DRM applications
S Chow, P Eisen, H Johnson… - ACM Workshop on Digital …, 2002 - Springer
For digital rights management (drm) software implementations incorporating cryptography,
white-box cryptography (cryptographic implementation designed to withstand the white-box …
white-box cryptography (cryptographic implementation designed to withstand the white-box …
Cryptanalysis of a white box AES implementation
The white box attack context as described in [1, 2] is the common setting where
cryptographic software is executed in an untrusted environment—ie an attacker has gained …
cryptographic software is executed in an untrusted environment—ie an attacker has gained …
Differential computation analysis: Hiding your white-box designs is not enough
Although all current scientific white-box approaches of standardized cryptographic primitives
are broken, there is still a large number of companies which sell “secure” white-box …
are broken, there is still a large number of companies which sell “secure” white-box …
[PDF][PDF] Howard: A Dynamic Excavator for Reverse Engineering Data Structures.
Even the most advanced reverse engineering techniques and products are weak in
recovering data structures in stripped binaries—binaries without symbol tables …
recovering data structures in stripped binaries—binaries without symbol tables …
Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key
In this paper we pick up an old challenge to design public key or white-box constructions
from symmetric cipher components. We design several encryption schemes based on the …
from symmetric cipher components. We design several encryption schemes based on the …