Protecting software through obfuscation: Can it keep pace with progress in code analysis?

S Schrittwieser, S Katzenbeisser, J Kinder… - Acm computing surveys …, 2016 - dl.acm.org
Software obfuscation has always been a controversially discussed research area. While
theoretical results indicate that provably secure obfuscation in general is impossible, its …

A tutorial on software obfuscation

S Banescu, A Pretschner - Advances in Computers, 2018 - Elsevier
Protecting a digital asset once it leaves the cyber trust boundary of its creator is a
challenging security problem. The creator is an entity which can range from a single person …

Obfuscator-LLVM--software protection for the masses

P Junod, J Rinaldini, J Wehrli… - 2015 ieee/acm 1st …, 2015 - ieeexplore.ieee.org
Software security with respect to reverse-engineering is a challenging discipline that has
been researched for several years and which is still active. At the same time, this field is …

Authentication system and method for server-based payments

C Radu - US Patent 11,120,436, 2021 - Google Patents
A method of performing a payment transaction employing a two-factor authentication
mechanism. The method includes engaging in cryptographic processing with a …

Providing robust and ubiquitous security support for mobile ad-hoc networks

J Kong, Z Petros, H Luo, S Lu… - … Conference on Network …, 2001 - ieeexplore.ieee.org
Providing security support for mobile ad-hoc networks is challenging for several reasons:(a)
wireless networks are susceptible to attacks ranging from passive eavesdropping to active …

Cryptographic Schemes Based on the ASASA Structure: Black-Box, White-Box, and Public-Key

A Biryukov, C Bouillaguet, D Khovratovich - Advances in Cryptology …, 2014 - Springer
In this paper we pick up an old challenge to design public key or white-box constructions
from symmetric cipher components. We design several encryption schemes based on the …

White-box cryptography revisited: Space-hard ciphers

A Bogdanov, T Isobe - Proceedings of the 22nd ACM SIGSAC …, 2015 - dl.acm.org
The need for software security in untrusted environments is ever increasing. White-box
cryptography aims to ensure the security of cryptographic algorithms when the attacker has …

Cryptanalysis of a perturbated white-box AES implementation

Y De Mulder, B Wyseur, B Preneel - Progress in Cryptology-INDOCRYPT …, 2010 - Springer
In response to various cryptanalysis results on white-box cryptography, Bringer et al.
presented a novel white-box strategy. They propose to extend the round computations of a …

White-box security notions for symmetric encryption schemes

C Delerablée, T Lepoint, P Paillier, M Rivain - Selected Areas in …, 2014 - Springer
White-box cryptography has attracted a growing interest from researchers in the last decade.
Several white-box implementations of standard block-ciphers (DES, AES) have been …

Efficient and provable white-box primitives

PA Fouque, P Karpman, P Kirchner… - … Conference on the Theory …, 2016 - Springer
In recent years there have been several attempts to build white-box block ciphers whose
implementations aim to be incompressible. This includes the weak white-box ASASA …