Encyclopedia of Cryptography and Security 2011
DOI: 10.1007/978-1-4419-5906-5_627
|View full text |Cite
|
Sign up to set email alerts
|

White-Box Cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 18 publications
(12 citation statements)
references
References 9 publications
0
10
0
Order By: Relevance
“…We used this tool to model attacks on two software protection techniques. The first, as shown in Figure 5, aims to extract the cryptographic key from a White-Box Crypto (WBC) [36] library. The second aims at de-obfuscating the code of an application protected by the use of custom, randomized instruction sets that are interpreted by a software virtual machine (SoftVM) [37], as shown in Figure 6.…”
Section: Petri Net Modelling Of Attacksmentioning
confidence: 99%
See 1 more Smart Citation
“…We used this tool to model attacks on two software protection techniques. The first, as shown in Figure 5, aims to extract the cryptographic key from a White-Box Crypto (WBC) [36] library. The second aims at de-obfuscating the code of an application protected by the use of custom, randomized instruction sets that are interpreted by a software virtual machine (SoftVM) [37], as shown in Figure 6.…”
Section: Petri Net Modelling Of Attacksmentioning
confidence: 99%
“…The ACTC's protections aim at defending against reverse-engineering, tampering, and cloning. They include code and data obfuscations [13], white-box cryptography (as also discussed in Section 4.2.8) [36], code mobility [41], code diversity, code guards, code renewability, remote attestation and migration of sensitive code to secure servers [42], use of custom instruction sets interpreted by virtual machines [37] (as also discussed in Section 4.2.8), anti-debugging by means of self-debuggers [27], and more.…”
Section: Validation On Software Protection Tool Chainmentioning
confidence: 99%
“…A digital signature scheme typically consists of three algorithms: the key generation algorithm, the signing algorithm, and the verification algorithm. There are three main attack models according to the capabilities of an adversary to attack cryptosystems [21], for example, a digital signature scheme. The first is the black-box model.…”
Section: Digital Signature Schemes and Attack Modelsmentioning
confidence: 99%
“…There are three main models of the capability of an adversary to attack a cryptosystem [1]. First is the black-box model.…”
Section: Introductionmentioning
confidence: 99%