Overview
Explore the concept of Differential Computation Analysis in this 21-minute conference talk from CHES 2016. Delve into the white box attack model and its practical applications. Examine white box implementations, code lifting techniques, and software traces. Learn about visualization methods and study a white box example with its implementation. Analyze the naive approach and its results, discuss potential countermeasures, and explore open-source solutions. Gain valuable insights into why hiding white box designs may not be sufficient for security purposes.
Syllabus
Intro
White Box Attack Model
Where is this used in practice
White Box Implementations
Code Lifting
Our Approach
Software Traces
Visualization
White Box Example
White Box Implementation Example
Naive Approach
Results
countermeasures
open source
conclusion
Taught by
TheIACR