Filters








2,918 Hits in 5.0 sec

Implementation of White-Box Cryptography in Credit Card Processing Combined with Code Obfuscation

Nilima Yadav, Sarvesh Tanwar
2013 International Journal of Computer Applications  
Full-privileged attack software shares a host with cryptographic software, having complete access to the implementation of algorithms, dynamic execution (with instantiated cryptographic keys) can be observed  ...  Another technique such as obfuscation is mainly designed to facilitate securing of e-commerce and ebanking applications, which often embed cryptographic keys and critical information.  ...  The white-box environment puts hard additional restrictions on implementations of the cryptographic algorithms [9] .  ... 
doi:10.5120/11938-7728 fatcat:p3cwv4ammveh3kdxrqdsna4oma

ARO_EDGE: A Technique to Ensure Data Security in Internet of Things (IoT)

A. Vithya Vijayalakshmi, L. Arockiam
2018 Asian Journal of Computer Science and Technology  
This proposed confidentiality technique is based on data obfuscation technique to prevent the data from the attackers and unauthorized users.  ...  Lightweight and efficient way of providing secure communication in the IoT are the need of the hour. To overcome this problem, a technique has been proposed.  ...  Based on block size, key size, number of rounds, and structures they analysed the cryptographic algorithms.  ... 
doi:10.51983/ajcst-2018.7.2.1873 fatcat:baxjjuvu5vcb7ljhqtfc3l5nnu

Sensitive Data Hiding Scheme for Internet of Things using Function Call Obfuscation Techniques

Jeongmi Shin, Yeonseung Ryu
2016 International Journal of Security and Its Applications  
In particular, cryptographic keys are vital for securing systems and communication. In this paper, we study a sensitive data hiding scheme for IoT devices using software obfuscation techniques.  ...  A new era of Internet of Things (IoT) will emerge in near future due to the rapid innovations and advancements in computing and communication technologies.  ...  This paper is a revised and expanded version of a paper entitled "Key Protection Scheme for Secure Internet of Things" presented at "The 5 th International Conference on Information Science and Industrial  ... 
doi:10.14257/ijsia.2016.10.10.16 fatcat:jww6khovjngbfnwfztnyddfdc4

Revisiting Software Protection [chapter]

Paul C. van Oorschot
2003 Lecture Notes in Computer Science  
We provide a selective survey on software protection, including approaches to software tamper resistance, obfuscation, software diversity, and white-box cryptography.  ...  The attacker's objective is to extract the cryptographic key, for use on a different platform. As suggested above, in this context standard cryptographic algorithms fail to provide protection.  ...  The white-box attack context assumes fully-privileged attack software has full access to the implementation of cryptographic algorithms (e.g. shares the host), can view and alter internal algorithm details  ... 
doi:10.1007/10958513_1 fatcat:5hjupbqp5bgvxdrt2tlkeprr6i

A Novel and Efficient countermeasure against Power Analysis Attacks using Elliptic Curve Cryptography

M Prabu, R.Shanmugalakshmi
2010 International Journal of Advanced Computer Science and Applications  
Recently, there is a leakage in the communication channel information by the cryptographic processors. It is the major chore to overcome the pouring out or spreading out of the secure data.  ...  The theoretical analysis based on these result has been shown and it represents how the algorithm design should fluctuate from the facade side channel attacks.  ...  ACKNOWLEDGEMENT I would like to thank Dr.R.Shanmugalakshmi for her fruitful comments and suggestion on the preliminary version of this paper.  ... 
doi:10.14569/ijacsa.2010.010204 fatcat:tg34t7eobbaybnsfyhveexyw64

Cryptographic Assumptions: A Position Paper [chapter]

Shafi Goldwasser, Yael Tauman Kalai
2015 Lecture Notes in Computer Science  
on.  ...  We believe that the lack of standards of what is accepted as a reasonable cryptographic assumption can be harmful to the credibility of our field.  ...  the security of novel cryptographic schemes (e.g., IO obfuscation) based on an average case complexity assumption would be a triumph.  ... 
doi:10.1007/978-3-662-49096-9_21 fatcat:wxfiqlab4jhhpb2ncpeo5ltdyi

Cryptographic Algorithms [chapter]

2015 Applied Cryptography, Second Edition  
Specialized algorithms have been proposed to recover cryptographic keys from decayed memory images. However, these techniques were cipher-dependent and certainly uneasy to develop and to fine tune.  ...  In the second part of this thesis, we present an obfuscated implementation of RC4.  ...  On the other hand, in side channel attacks, the attacker is assumed to have physical access to the cryptographic device.  ... 
doi:10.1002/9781119183471.part3 fatcat:rvk3izmftvebbkajuc7xzha6fe

Doppelganger Obfuscation — Exploring theDefensive and Offensive Aspects of Hardware Camouflaging

Max Hoffmann, Christof Paar
2020 Transactions on Cryptographic Hardware and Embedded Systems  
In both applications of Doppelganger, the resulting design size is indistinguishable from that of an unobfuscated design, depending on the choice of encodings.  ...  We show how an invisible, remotely exploitable key-leakage Trojan can be injected into the same cryptographic coprocessor just through obfuscation.  ...  On the physical level, our technique makes use of camouflaged gates with dummy inputs and can be instantiated independently of the physical realization of said primitive.  ... 
doi:10.46586/tches.v2021.i1.82-108 fatcat:rzm42ok2lzc5xmy5vjj6bhlbve

CipherXRay: Exposing Cryptographic Operations and Transient Secrets from Monitored Binary Execution

Xin Li, Xinyuan Wang, Wentao Chang
2014 IEEE Transactions on Dependable and Secure Computing  
operations and transient secrets from the execution of potentially obfuscated binary executables.  ...  Based on the avalanche effect of cryptographic functions, CipherXRay is able to accurately pinpoint the boundary of cryptographic operation and recover truly transient cryptographic secrets that only exist  ...  ACKNOWLEDGMENT We would like to thank the anonymous reviewers for their comments and suggestions that helped us improve the quality of our paper.  ... 
doi:10.1109/tdsc.2012.83 fatcat:yki6ukn6avd6vpgchevqlufuk4

Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded Microprocessors

Marc Fyrbiak, Simon Rokicki, Nicolai Bissantz, Russell Tessier, Christof Paar
2018 IEEE transactions on computers  
It is shown that our approach is effective against a wide variety of possible information disclosure attacks in case of a physically present adversary.  ...  Both measures are based on a compiler which generates obfuscated programs, and an embedded processor implemented in an FPGA with a randomized ISA encoding to execute the hybrid obfuscated program.  ...  The OASIS processor [4] also uses ciphered data with cryptographic keys provided by Physical Unclonable Functions (PUFs).  ... 
doi:10.1109/tc.2017.2649520 fatcat:p332lanfhfcijnqpusljfxqyr4

Performance Analysis of Fuzzy Based Sliding Mode and Self-Tuning Controls of Vector Controlled Induction Motor Drive

L. Sagar, B. Sarvesh
2017 International Journal of MC Square Scientific Research  
showed on a physical user-owned device such as a mobile phone.  ...  A Graphical Cryptographic Verification System that restores the static digital pictures naturally used in graphical password systems with personalized physical tokens, here in the form of digital pictures  ...  vision algorithms [13] .  ... 
doi:10.20894/ijmsr.117.009.001.037 fatcat:pyypemjlkfd2hpukmlt3z4f4bu

Hopes, fears, and software obfuscation

Boaz Barak
2016 Communications of the ACM  
I survey some of the recent progress on software obfuscation spurred by the exciting paper of Garg, Gentry, Halevi, Raykova, Sahai and Waters [GGH + 13].  ...  Nevertheless, I thought it might still be of interest to cryptographers.  ...  Thanks to Dan Boneh, Craig Gentry, Omer Paneth, Amit Sahai, Brent Waters and the anonymous CACM reviewers for helpful comments on previous versions of this article.  ... 
doi:10.1145/2757276 fatcat:wejuaemxqbdl3mx5f7c6mel75i

White-box attack context cryptovirology

Sébastien Josse
2008 Journal in Computer Virology  
This paper presents the use of cryptographic mechanisms that are suited to the white box attack context (the attacker is supposed to have full control of the target program's execution environment) and  ...  New cryptographic mechanisms, corresponding to a particular implementation of traditional (black box) cryptography have been recently designed to ensure the deep protection of legitimate applications.  ...  Theoretical background We will focus in this paper on cryptographic mechanisms tailor-made to ensure confidentiality of a secret key within an algorithm.  ... 
doi:10.1007/s11416-008-0097-x fatcat:hsp2h732bnbevhjdg2t64po7vy

A Thorough Investigation on Software Protection Techniques against Various Attacks

Sasirekha N
2012 Bonfring International Journal of Software Engineering and Soft Computing  
Preventing attacks of software will have a huge influence on economic development. Thus, it is very vital to develop approaches that protect software from threats.  ...  Considerable attempts have been made to enhance the security of the computer systems because of various available software piracy and virus attacks.  ...  Cohen"s research [22] on software diversity and obfuscation is directly concentrated to software protection and offers a wide range of algorithms.  ... 
doi:10.9756/bijsesc.10030 fatcat:u273xyqjxjeyvisfsajcanpfoe

An efficient $$\mathcal{iO}$$ i O -based data integrity verification scheme for cloud storage

Lixue Sun, Chunxiang Xu, Yuan Zhang, Kefei Chen
2018 Science China Information Sciences  
Acknowledgements This work was supported by National Key R&D Program of China (Grant No. 2017YFB0802000) and National Natural Science Foundation of China (Grant No. 61370203).  ...  Numerous cryptographic applications have recently been constructed based on iO [6] [7] [8] .  ...  However, despite these benefits, cloud storage deprives users of physical control over their data, which poses new challenges in data security [1] [2] [3] [4] .  ... 
doi:10.1007/s11432-018-9500-0 fatcat:or3jftfaabacfpd2hla45y3h3a
« Previous Showing results 1 — 15 out of 2,918 results