Unraveling Attacks to Machine Learning-Based IoT Systems: A Survey and the Open Libraries Behind Them

C Liu, B Chen, W Shao, C Zhang… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
The advent of the Internet of Things (IoT) has brought forth an era of unprecedented
connectivity, with an estimated 80 billion smart devices expected to be in operation by the …

[PDF][PDF] 侧信道攻击与防御技术研究进展

王永娟, 樊昊鹏, 代政一, 袁庆军, 王相宾 - 计算机学报, 2023 - 159.226.43.17
摘要侧信道攻击利用密码实现的物理泄露而不是理论弱点来恢复密钥, 对密码系统的安全实现有
严重的现实威胁. 密码设备运行时所产生的能量, 电磁, 缓存和故障输出等侧信息均可能导致密钥 …

Implicit white-box implementations: White-boxing ARX ciphers

A Ranea, J Vandersmissen, B Preneel - Annual International Cryptology …, 2022 - Springer
Since the first white-box implementation of AES published twenty years ago, no significant
progress has been made in the design of secure implementations against an attacker with …

How to reveal the secrets of an obscure white-box implementation

L Goubin, P Paillier, M Rivain, J Wang - Journal of Cryptographic …, 2020 - Springer
White-box cryptography (WBC) protects key extraction from software implementations of
cryptographic primitives. Many academic works have been done achieving partial results …

Yoroi: Updatable whitebox cryptography

Y Koike, T Isobe - IACR Transactions on Cryptographic Hardware and …, 2021 - tches.iacr.org
Whitebox cryptography aims to provide security in the whitebox setting where the adversary
has unlimited access to the implementation and its environment. In order to ensure security …

Defeating state-of-the-art white-box countermeasures with advanced gray-box attacks

L Goubin, M Rivain, J Wang - IACR Transactions on Cryptographic …, 2020 - bmt.ub.rub.de
The goal of white-box cryptography is to protect secret keys embedded in a cryptographic
software deployed in an untrusted environment. In this article, we revisit state-of-the-art …

Higher-order DCA against standard side-channel countermeasures

A Bogdanov, M Rivain, PS Vejre, J Wang - International Workshop on …, 2019 - Springer
At CHES 2016, Bos et al. introduced differential computational analysis (DCA) as an attack
on white-box software implementations of block ciphers. This attack builds on the same …

A white-box masking scheme resisting computational and algebraic attacks

O Seker, T Eisenbarth, M Liskiewicz - IACR Transactions on …, 2021 - tches.iacr.org
White-box cryptography attempts to protect cryptographic secrets in pure software
implementations. Due to their high utility, white-box cryptosystems (WBC) are deployed by …

On the (Im) possibility of Preventing Differential Computation Analysis with Internal Encodings

L Castelnovi, A Houzelot - IACR Transactions on …, 2024 - ojs.ub.ruhr-uni-bochum.de
White-box cryptography aims at protecting implementations of cryptographic algorithms
against a very powerful attacker who controls the execution environment. The first defensive …

Dummy shuffling against algebraic attacks in white-box implementations

A Biryukov, A Udovenko - Annual International Conference on the Theory …, 2021 - Springer
At CHES 2016, Bos et al. showed that most of existing white-box implementations are easily
broken by standard side-channel attacks. A natural idea to apply the well-developed side …