Главная
Study mode:
on
1
Intro
2
What and why...
3
Black-Box Security
4
Gray-Box Security
5
Sign of the times...
6
White Box Cryptography
7
Software in the White Box context
8
Software Protection
9
How does WBC work?
10
WBC Construction: partial evaluation
11
Example code
12
External encoding
13
WBC attack literature
14
Differential Fault Analysis
15
DFA computation for DES
16
Divide and conquer
17
DFA attack process
18
Locating the injection point
19
Fault injection
20
STEP 3: Analysis
21
Summary DFA results
22
Hypothesis testing
23
Generalization of differential SCA attacks
24
To our surprise....
25
SCA attack process
26
Capture measurement
27
SCA Analysis
28
What does it mean?
29
How to make it stronger?
Description:
Explore practical attacks against obfuscated ciphers in this Black Hat conference talk. Delve into the world of White-Box Cryptography (WBC) and learn how to assess the security of implementations that aim to protect cryptographic algorithms from attackers with full internal access. Discover how attacks typically used against hardware cryptosystems can be adapted to white-box settings, focusing on TDES and AES ciphers. Gain insights into generic yet practical attack methods, their requirements, and potential countermeasures. Witness demonstrations of attacks on open-source WBC implementations using custom tools. Whether you're tasked with evaluating WBC-based solutions or designing them, acquire a deeper understanding of common vulnerabilities and the importance of robust security assessments. Explore topics such as differential fault analysis, software protection techniques, and the generalization of differential side-channel attacks in the context of white-box cryptography.

Unboxing the White-Box - Practical Attacks Against Obfuscated Ciphers

Black Hat
Add to list