Unboxing the White-Box - Practical Attacks Against Obfuscated Ciphers

Unboxing the White-Box - Practical Attacks Against Obfuscated Ciphers

Black Hat via YouTube Direct link

Intro

1 of 29

1 of 29

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Unboxing the White-Box - Practical Attacks Against Obfuscated Ciphers

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What and why...
  3. 3 Black-Box Security
  4. 4 Gray-Box Security
  5. 5 Sign of the times...
  6. 6 White Box Cryptography
  7. 7 Software in the White Box context
  8. 8 Software Protection
  9. 9 How does WBC work?
  10. 10 WBC Construction: partial evaluation
  11. 11 Example code
  12. 12 External encoding
  13. 13 WBC attack literature
  14. 14 Differential Fault Analysis
  15. 15 DFA computation for DES
  16. 16 Divide and conquer
  17. 17 DFA attack process
  18. 18 Locating the injection point
  19. 19 Fault injection
  20. 20 STEP 3: Analysis
  21. 21 Summary DFA results
  22. 22 Hypothesis testing
  23. 23 Generalization of differential SCA attacks
  24. 24 To our surprise....
  25. 25 SCA attack process
  26. 26 Capture measurement
  27. 27 SCA Analysis
  28. 28 What does it mean?
  29. 29 How to make it stronger?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.