Completed
Software Protection
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Unboxing the White-Box - Practical Attacks Against Obfuscated Ciphers
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What and why...
- 3 Black-Box Security
- 4 Gray-Box Security
- 5 Sign of the times...
- 6 White Box Cryptography
- 7 Software in the White Box context
- 8 Software Protection
- 9 How does WBC work?
- 10 WBC Construction: partial evaluation
- 11 Example code
- 12 External encoding
- 13 WBC attack literature
- 14 Differential Fault Analysis
- 15 DFA computation for DES
- 16 Divide and conquer
- 17 DFA attack process
- 18 Locating the injection point
- 19 Fault injection
- 20 STEP 3: Analysis
- 21 Summary DFA results
- 22 Hypothesis testing
- 23 Generalization of differential SCA attacks
- 24 To our surprise....
- 25 SCA attack process
- 26 Capture measurement
- 27 SCA Analysis
- 28 What does it mean?
- 29 How to make it stronger?