Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Differential Computation Analysis - Hiding Your White Box Designs Is Not Enough

TheIACR via YouTube

Overview

Explore the concept of Differential Computation Analysis in this 21-minute conference talk from CHES 2016. Delve into the white box attack model and its practical applications. Examine white box implementations, code lifting techniques, and software traces. Learn about visualization methods and study a white box example with its implementation. Analyze the naive approach and its results, discuss potential countermeasures, and explore open-source solutions. Gain valuable insights into why hiding white box designs may not be sufficient for security purposes.

Syllabus

Intro
White Box Attack Model
Where is this used in practice
White Box Implementations
Code Lifting
Our Approach
Software Traces
Visualization
White Box Example
White Box Implementation Example
Naive Approach
Results
countermeasures
open source
conclusion

Taught by

TheIACR

Reviews

Start your review of Differential Computation Analysis - Hiding Your White Box Designs Is Not Enough

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.