WO2002046890A8 - System and method for protecting computer software from a white box attack - Google Patents

System and method for protecting computer software from a white box attack

Info

Publication number
WO2002046890A8
WO2002046890A8 PCT/CA2001/001729 CA0101729W WO0246890A8 WO 2002046890 A8 WO2002046890 A8 WO 2002046890A8 CA 0101729 W CA0101729 W CA 0101729W WO 0246890 A8 WO0246890 A8 WO 0246890A8
Authority
WO
WIPO (PCT)
Prior art keywords
computer software
white box
protecting computer
box attack
attack
Prior art date
Application number
PCT/CA2001/001729
Other languages
French (fr)
Other versions
WO2002046890A2 (en
Inventor
Harold J Johnson
Stanley T Chow
Philip A Eisen
Original Assignee
Cloakware Corp
Harold J Johnson
Stanley T Chow
Philip A Eisen
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cloakware Corp, Harold J Johnson, Stanley T Chow, Philip A Eisen filed Critical Cloakware Corp
Priority to CA002431443A priority Critical patent/CA2431443A1/en
Priority to US10/433,966 priority patent/US7397916B2/en
Priority to AU2002221414A priority patent/AU2002221414A1/en
Priority to EP01999868A priority patent/EP1350154A2/en
Publication of WO2002046890A2 publication Critical patent/WO2002046890A2/en
Publication of WO2002046890A8 publication Critical patent/WO2002046890A8/en
Priority to US11/020,313 priority patent/US7809135B2/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • H04L9/003Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/16Obfuscation or hiding, e.g. involving white box
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
PCT/CA2001/001729 2000-12-08 2001-12-10 System and method for protecting computer software from a white box attack WO2002046890A2 (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
CA002431443A CA2431443A1 (en) 2000-12-08 2001-12-10 System and method for protecting computer software from a white box attack
US10/433,966 US7397916B2 (en) 2000-12-08 2001-12-10 System and method for protecting computer software from a white box attack
AU2002221414A AU2002221414A1 (en) 2000-12-08 2001-12-10 System and method for protecting computer software from a white box attack
EP01999868A EP1350154A2 (en) 2000-12-08 2001-12-10 System and method for protecting computer software from a white box attack
US11/020,313 US7809135B2 (en) 2000-12-08 2004-12-27 System and method for protecting computer software from a white box attack

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CA2,327,911 2000-12-08
CA002327911A CA2327911A1 (en) 2000-12-08 2000-12-08 Obscuring functions in computer software

Publications (2)

Publication Number Publication Date
WO2002046890A2 WO2002046890A2 (en) 2002-06-13
WO2002046890A8 true WO2002046890A8 (en) 2003-03-06

Family

ID=4167864

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2001/001729 WO2002046890A2 (en) 2000-12-08 2001-12-10 System and method for protecting computer software from a white box attack

Country Status (5)

Country Link
US (2) US7397916B2 (en)
EP (1) EP1350154A2 (en)
AU (1) AU2002221414A1 (en)
CA (2) CA2327911A1 (en)
WO (1) WO2002046890A2 (en)

Families Citing this family (196)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2327911A1 (en) 2000-12-08 2002-06-08 Cloakware Corporation Obscuring functions in computer software
US7340058B2 (en) * 2001-04-09 2008-03-04 Lucent Technologies Inc. Low-overhead secure information processing for mobile gaming and other lightweight device applications
AUPR970601A0 (en) * 2001-12-21 2002-01-24 Canon Kabushiki Kaisha Encoding information in a watermark
US7493607B2 (en) 2002-07-09 2009-02-17 Bluerisc Inc. Statically speculative compilation and execution
FR2850811A1 (en) * 2003-01-30 2004-08-06 St Microelectronics Sa Integrated circuit e.g. chip card, anti-fraud method, involves performing masking of data and unmasking of encryption function result by random number, using two functionally identical operators having respective physical traces
JP2006517036A (en) * 2003-02-06 2006-07-13 ディスクレティックス・テクノロジーズ・リミテッド Apparatus and method for manipulating masked data
US8510571B1 (en) 2003-03-24 2013-08-13 Hoi Chang System and method for inserting security mechanisms into a software program
US7469266B2 (en) 2003-09-29 2008-12-23 International Business Machines Corporation Method and structure for producing high performance linear algebra routines using register block data format routines
US20050114850A1 (en) 2003-10-29 2005-05-26 Saurabh Chheda Energy-focused re-compilation of executables and hardware mechanisms based on compiler-architecture interaction and compiler-inserted control
US7996671B2 (en) 2003-11-17 2011-08-09 Bluerisc Inc. Security of program executables and microprocessors based on compiler-architecture interaction
US8700533B2 (en) * 2003-12-04 2014-04-15 Black Duck Software, Inc. Authenticating licenses for legally-protectable content based on license profiles and content identifiers
US9489687B2 (en) * 2003-12-04 2016-11-08 Black Duck Software, Inc. Methods and systems for managing software development
RU2370897C2 (en) * 2003-12-11 2009-10-20 Кониклейке Филипс Электроникс Н.В. System of block cryptographical protection, using conversions to hide main function of cryptographic protection of each coding cycle
US8607209B2 (en) 2004-02-04 2013-12-10 Bluerisc Inc. Energy-focused compiler-assisted branch prediction
DE102004011488B4 (en) * 2004-03-09 2007-07-05 Giesecke & Devrient Gmbh Protection of software against attacks
US8887287B2 (en) * 2004-10-27 2014-11-11 Alcatel Lucent Method and apparatus for software integrity protection using timed executable agents
CN101048969B (en) * 2004-10-28 2012-04-04 耶德托公司 Method and system for obfuscating a cryptographic function
US8155306B2 (en) * 2004-12-09 2012-04-10 Intel Corporation Method and apparatus for increasing the speed of cryptographic processing
FR2879383A1 (en) * 2004-12-14 2006-06-16 St Microelectronics Sa MASKING OF BINARY WORDS PROCESSED BY AN INTEGRATED CIRCUIT
US20060161612A1 (en) * 2005-01-14 2006-07-20 International Business Machines Corporation Method and structure for a generalized cache-register file interface with data restructuring methods for multiple cache levels and hardware pre-fetching
US20060168401A1 (en) * 2005-01-26 2006-07-27 International Business Machines Corporation Method and structure for high-performance linear algebra in the presence of limited outstanding miss slots
CN100555300C (en) * 2005-03-25 2009-10-28 松下电器产业株式会社 Program conversion apparatus, secure processing device, computer program and recording medium
US20070022288A1 (en) * 2005-07-05 2007-01-25 Stmicroelectronics S.A. Checking of a digital quantity stored in a memory area
US7769165B2 (en) * 2005-10-14 2010-08-03 Microsoft Corporation Semi-public white-box cipher
US7743253B2 (en) * 2005-11-04 2010-06-22 Microsoft Corporation Digital signature for network coding
US7853018B2 (en) * 2005-11-10 2010-12-14 Atallah Mikhail J Method and apparatus for hiding a private key
FR2893796B1 (en) * 2005-11-21 2008-01-04 Atmel Corp ENCRYPTION PROTECTION METHOD
DE602006020010D1 (en) * 2005-12-19 2011-03-24 St Microelectronics Sa Protection of the execution of a DES algorithm
US8479016B2 (en) 2006-03-10 2013-07-02 Irdeto B.V. Method and system for obfuscating a cryptographic function
US8479018B2 (en) * 2006-04-28 2013-07-02 Panasonic Corporation System for making program difficult to read, device for making program difficult to read, and method for making program difficult to read
JP5496663B2 (en) * 2006-07-12 2014-05-21 イルデト・コーポレート・ビー・ヴイ Tamper resistance of digital data processing equipment
EP2044723A2 (en) * 2006-07-12 2009-04-08 Koninklijke Philips Electronics N.V. Verifying authenticity of an execution environment
US8997255B2 (en) 2006-07-31 2015-03-31 Inside Secure Verifying data integrity in a data storage device
US8352752B2 (en) * 2006-09-01 2013-01-08 Inside Secure Detecting radiation-based attacks
US8010803B2 (en) * 2006-10-12 2011-08-30 Black Duck Software, Inc. Methods and apparatus for automated export compliance
US7681045B2 (en) * 2006-10-12 2010-03-16 Black Duck Software, Inc. Software algorithm identification
US9361617B2 (en) * 2008-06-17 2016-06-07 Verifone, Inc. Variable-length cipher system and method
US20080126766A1 (en) * 2006-11-03 2008-05-29 Saurabh Chheda Securing microprocessors against information leakage and physical tampering
KR101213156B1 (en) 2006-12-21 2012-12-17 삼성전자주식회사 Distributed rivest shamir adleman signature method and signature generative node
JP2010515945A (en) * 2007-01-11 2010-05-13 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Tracking a copy of the implementation
US9589115B2 (en) * 2007-01-18 2017-03-07 Panasonic Intellectual Property Management Co., Ltd. Obfuscation assisting apparatus
KR101338409B1 (en) * 2007-01-25 2013-12-10 삼성전자주식회사 Method and node for generating distributed rivest shamir adleman signature in ad-hoc network
US8752032B2 (en) 2007-02-23 2014-06-10 Irdeto Canada Corporation System and method of interlocking to protect software-mediated program and device behaviours
WO2008101340A1 (en) * 2007-02-23 2008-08-28 Cloakware Corporation System and method for interlocking to protect software-mediated program and device behaviours
US20080301448A1 (en) * 2007-06-01 2008-12-04 Microsoft Corporation Security Against Corruption for Networked Storage
KR100969961B1 (en) * 2007-12-20 2010-07-15 한국전자통신연구원 Substitution apparatus of block code aria and method thereof
JP2011512726A (en) * 2008-01-31 2011-04-21 イルデト・コーポレート・ビー・ヴイ Smart card protection
CN101939724B (en) 2008-02-06 2013-11-27 Nxp股份有限公司 Data processing device and method for executing obfuscated programs
EP2243098A2 (en) 2008-02-11 2010-10-27 Nxp B.V. Method of program obfuscation and processing device for executing obfuscated programs
US8800048B2 (en) * 2008-05-20 2014-08-05 Microsoft Corporation Software protection through interdependent parameter cloud constrained software execution
KR101597251B1 (en) * 2008-05-23 2016-02-24 이르데토 비.브이. System and method for generating whitebox implementations of software applications
EP2300954B1 (en) 2008-06-24 2014-12-03 NDS Limited Security within integrated circuits
US8171306B2 (en) * 2008-11-05 2012-05-01 Microsoft Corporation Universal secure token for obfuscation and tamper resistance
JP4687775B2 (en) * 2008-11-20 2011-05-25 ソニー株式会社 Cryptographic processing device
US8151333B2 (en) * 2008-11-24 2012-04-03 Microsoft Corporation Distributed single sign on technologies including privacy protection and proactive updating
JP5688528B2 (en) * 2009-03-10 2015-03-25 イルデト・ベー・フェー White-box cryptosystem using input-dependent encoding
EP2415199B1 (en) * 2009-03-31 2017-10-18 Koninklijke Philips N.V. Method for performing a cryptographic task in an electronic component
DE102009019981A1 (en) * 2009-05-05 2010-11-11 Giesecke & Devrient Gmbh Method for protecting software and portable data carriers stored on a portable data carrier
CN102483790B (en) * 2009-05-06 2016-01-20 爱迪德技术有限公司 Utilize the cryptological interlocking scale-of-two protection of white box
EP2443786A1 (en) * 2009-06-19 2012-04-25 Irdeto B.V. White-box cryptographic system with configurable key using intermediate data modification
WO2010146140A1 (en) * 2009-06-19 2010-12-23 Irdeto B.V. White-box cryptographic system with configurable key using block selection
EP3923165A1 (en) 2009-11-13 2021-12-15 Irdeto B.V. System and method to protect java bytecode code against static and dynamic attacks within hostile execution environments
US8549322B2 (en) * 2010-03-25 2013-10-01 International Business Machines Corporation Secure data scanning method and system
US9892272B2 (en) 2010-03-31 2018-02-13 Irdeto B.V. System and method for encapsulating and enabling protection through diverse variations in software libraries
CN103081398B (en) * 2010-03-31 2016-04-06 爱迪德技术有限公司 For the protection of the system and method that password assets are attacked from white box
EP2388730A1 (en) * 2010-05-17 2011-11-23 Nagravision S.A. Method for generating software code
US20120079462A1 (en) * 2010-09-24 2012-03-29 SoftKrypt LLC Systems and methods of source software code obfuscation
FR2966953B1 (en) 2010-11-02 2015-08-28 St Microelectronics Rousset METHOD OF CRYPTOGRAPHIC COUNTERPRESSION BY DERIVATION OF SECRET DATA
MY150357A (en) * 2010-11-04 2013-12-31 Mimos Berhad A method for linear transformation in substitution-permutation networks symmetric-key block cipher
EP2458774A1 (en) * 2010-11-24 2012-05-30 Nagravision S.A. A method of processing a cryptographic function in obfuscated form
US20120201373A1 (en) * 2011-02-03 2012-08-09 Futurewei Technologies, Inc. Design of a Good General-Purpose Hash Function with Limited Resources
WO2012126083A1 (en) * 2011-03-24 2012-09-27 Irdeto Canada Corporation System and method providing dependency networks throughout applications for attack resistance
EP2506174B1 (en) * 2011-03-30 2019-01-09 Irdeto B.V. Enabling a software application to be executed on a hardware device
US8621237B1 (en) * 2011-06-30 2013-12-31 Emc Corporation Protecting against cryptographic key exposure in source code
WO2013059367A1 (en) * 2011-10-18 2013-04-25 Paul Marion Hriljac Systems and methods of source software code modification
CN104396181B (en) * 2012-02-09 2018-02-23 爱迪德技术有限公司 system and method for generating and protecting cryptographic key
EP2828745B1 (en) * 2012-03-22 2020-01-08 Irdeto B.V. Updating software components
WO2013142980A1 (en) 2012-03-30 2013-10-03 Irdeto Canada Corporation Securing accessible systems using variable dependent coding
US8976960B2 (en) 2012-04-02 2015-03-10 Apple Inc. Methods and apparatus for correlation protected processing of cryptographic operations
BR112014028947A2 (en) * 2012-05-25 2017-06-27 Koninklijke Philips Nv processor configuration method, processor configuration device, processor, and computer program product
DE102012209404A1 (en) * 2012-06-04 2013-12-05 Robert Bosch Gmbh Apparatus for executing a cryptographic method and method of operation therefor
US10185957B2 (en) 2012-06-12 2019-01-22 Square, Inc. Software pin entry
US20140324708A1 (en) * 2012-06-12 2014-10-30 Square, Inc. Raw sensor input encryption for passcode entry security
US8938796B2 (en) 2012-09-20 2015-01-20 Paul Case, SR. Case secure computer architecture
WO2014059547A1 (en) * 2012-10-17 2014-04-24 Elliptic Technologies Inc. Cryptographic sequencing system and method
US9311489B2 (en) 2013-03-07 2016-04-12 Microsoft Technology Licensing, Llc Application forensics
BR112015027293A2 (en) * 2013-05-01 2017-07-25 Koninklijke Philips Nv electronic block coding device for encrypting and decrypting a digital data message block, electronic block coding, electronic block coding method for encrypting or decrypting a digital data message block, and computer program
RU2518950C9 (en) * 2013-05-06 2014-09-10 Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Санкт-Петербургский государственный электротехнический университет "ЛЭТИ" им. В.И. Ульянова (Ленина)" Method of encrypting n-bit unit m
KR102133200B1 (en) 2013-08-08 2020-07-13 서울대학교산학협력단 Method and apparatus for protecting of data
CN104376015B (en) * 2013-08-15 2020-03-17 腾讯科技(深圳)有限公司 Method and device for processing nodes in relational network
US9773240B1 (en) 2013-09-13 2017-09-26 Square, Inc. Fake sensor input for passcode entry security
US9613356B2 (en) 2013-09-30 2017-04-04 Square, Inc. Secure passcode entry user interface
US9928501B1 (en) 2013-10-09 2018-03-27 Square, Inc. Secure passcode entry docking station
DE102013222218A1 (en) * 2013-10-31 2014-05-22 Siemens Aktiengesellschaft Method for constructing circuit used for generating random bits used in asymmetric authentication method, involves linking specific functions with a pretext of a related function as another function, to perform fixed point free mapping
KR101807259B1 (en) * 2013-11-04 2017-12-08 한국전자통신연구원 Apparatus and methdo for encoding
US9223995B1 (en) * 2013-12-10 2015-12-29 Progress Software Corporation Semantic obfuscation of data in real time
US9900149B2 (en) * 2013-12-24 2018-02-20 Synopsys, Inc. Area efficient cryptographic method and apparatus
US10075288B1 (en) * 2014-02-28 2018-09-11 The Governing Council Of The University Of Toronto Systems, devices, and processes for homomorphic encryption
US9838198B2 (en) * 2014-03-19 2017-12-05 Nxp B.V. Splitting S-boxes in a white-box implementation to resist attacks
FR3018934B1 (en) * 2014-03-24 2017-05-26 Morpho METHOD OF INPUTTING DATA IN A BASE FOR THE PROTECTION OF THESE DATA
GB201405705D0 (en) * 2014-03-31 2014-05-14 Irdeto Bv Secured printed electronics device
GB201405755D0 (en) 2014-03-31 2014-05-14 Irdeto Bv Optimizing and protecting software
US10944545B2 (en) 2014-03-31 2021-03-09 Irdeto B.V. Obfuscated performance of a predetermined function
RU2542880C1 (en) * 2014-03-31 2015-02-27 Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Санкт-Петербургский государственный электротехнический университет"ЛЭТИ" им. В.И. Ульянова (Ленина)" Method of encrypting binary data unit
CN106416119B (en) * 2014-03-31 2019-10-11 爱迪德技术有限公司 Protect software project
GB201405706D0 (en) * 2014-03-31 2014-05-14 Irdeto Bv Software protection
RU2542929C1 (en) * 2014-04-14 2015-02-27 Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Санкт-Петербургский государственный электротехнический университет "ЛЭТИ" им. В.И. Ульянова (Ленина)" Method to code data unit represented as bit string
RU2542926C1 (en) * 2014-04-14 2015-02-27 Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Санкт-Петербургский государственный электротехнический университет "ЛЭТИ" им. В.И. Ульянова (Ленина)" Method to code message represented as multidigit binary number
US9338145B2 (en) 2014-04-28 2016-05-10 Nxp B.V. Security patch without changing the key
EP2940920B1 (en) * 2014-04-28 2017-03-08 Nxp B.V. Security patch without changing the key
US9485226B2 (en) * 2014-04-28 2016-11-01 Nxp B.V. Method for including an implicit integrity or authenticity check into a white-box implementation
US9641337B2 (en) * 2014-04-28 2017-05-02 Nxp B.V. Interface compatible approach for gluing white-box implementation to surrounding program
US9858440B1 (en) * 2014-05-23 2018-01-02 Shape Security, Inc. Encoding of sensitive data
US10412054B2 (en) 2014-06-24 2019-09-10 Nxp B.V. Method for introducing dependence of white-box implementation on a set of strings
KR101527329B1 (en) * 2014-09-12 2015-06-09 삼성에스디에스 주식회사 Apparatus and method for data encryption
CN106796624B (en) 2014-09-26 2021-05-04 爱迪德技术有限公司 Challenge-response method, associated computing device and associated computer-readable medium
US9252943B1 (en) * 2014-09-26 2016-02-02 The Boeing Company Parallelizable cipher construction
JP6621813B2 (en) 2014-09-30 2019-12-18 コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. Electronic computing device for performing obfuscated arithmetic
JP6818679B2 (en) * 2014-10-13 2021-01-20 シークエント ソフトウェア、インコーポレイテッド Secure host card embroidery credentials
CN104301095A (en) * 2014-10-13 2015-01-21 深圳中科讯联科技有限公司 DES round operation method and circuit
GB201418815D0 (en) 2014-10-22 2014-12-03 Irdeto Bv Providing access to content
DE102014016548A1 (en) * 2014-11-10 2016-05-12 Giesecke & Devrient Gmbh Method for testing and hardening software applications
US9600672B1 (en) * 2014-12-04 2017-03-21 Amazon Technologies, Inc. Dynamic function switching
EP3231125B1 (en) 2014-12-12 2019-02-20 Koninklijke Philips N.V. Electronic generation device
TR201907713T4 (en) * 2014-12-22 2019-06-21 Koninklijke Philips Nv Electronic computing device.
US10685096B2 (en) 2014-12-22 2020-06-16 Koninklijke Philips N.V. Hiding of a program execution
US10318271B2 (en) 2015-01-05 2019-06-11 Irdeto Canada Corporation Updating software components in a program
US9665699B2 (en) * 2015-03-13 2017-05-30 Nxp B.V. Implementing padding in a white-box implementation
GB201505434D0 (en) * 2015-03-30 2015-05-13 Irdeto Bv Cryptographic processing
CN108064381B (en) 2015-03-30 2021-06-18 爱迪德技术有限公司 Method for data protection
GB201505553D0 (en) 2015-03-31 2015-05-13 Irdeto Bv Online advertisements
US10372886B2 (en) * 2015-05-05 2019-08-06 Nxp B.V. Protecting the input/output of modular encoded white-box RSA/ECC
US10642786B2 (en) * 2015-05-19 2020-05-05 Cryptomove, Inc. Security via data concealment using integrated circuits
US10680796B2 (en) * 2015-05-19 2020-06-09 Koninklijke Philips N.V. Computing with encrypted values
US10664439B2 (en) 2015-05-19 2020-05-26 Cryptomove, Inc. Security via dynamic data movement in a cloud-based environment
US10037330B1 (en) 2015-05-19 2018-07-31 Cryptomove, Inc. Security via dynamic data movement in a cloud-based environment
WO2016187315A1 (en) 2015-05-19 2016-11-24 Cryptomove, Inc. Security via data concealment
RU2580060C1 (en) * 2015-05-20 2016-04-10 Федеральное государственное автономное образовательное учреждение высшего образования "Санкт-Петербургский государственный электротехнический университет "ЛЭТИ" им. В.И. Ульнова (Ленина)" Method to encrypt messages, represented as a multi-bit binary number
EP3320636A4 (en) * 2015-07-09 2019-02-27 HRL Laboratories, LLC Non-malleable obfuscator for sparse functions
US10509918B1 (en) * 2015-09-18 2019-12-17 Hrl Laboratories, Llc One-time obfuscation for polynomial-size ordered binary decision diagrams (POBDDs)
DE102015014038A1 (en) * 2015-10-30 2017-05-04 Giesecke & Devrient Gmbh Alternative representation of the crypto algorithm DES
NL2015745B1 (en) 2015-11-09 2017-05-26 Koninklijke Philips Nv A cryptographic device arranged to compute a target block cipher.
US10015009B2 (en) * 2015-11-25 2018-07-03 Nxp B.V. Protecting white-box feistel network implementation against fault attack
RU2708439C1 (en) * 2015-12-15 2019-12-06 Конинклейке Филипс Н.В. Computing device and method
US10728028B2 (en) * 2016-02-18 2020-07-28 Gideon Samid Transmitter for encoding information with randomly flipped bits and transmitting that information through a communications channel
US10229282B2 (en) * 2016-06-12 2019-03-12 Apple Inc. Efficient implementation for differential privacy using cryptographic functions
EP3475825B1 (en) 2016-06-23 2023-01-25 Cryptography Research, Inc. Cryptographic operations employing non-linear share encoding for protecting from external monitoring attacks
CN107547193A (en) * 2016-06-28 2018-01-05 埃沙尔公司 Make replacement operation from the method for side Multiple Channel Analysis
US10243937B2 (en) * 2016-07-08 2019-03-26 Nxp B.V. Equality check implemented with secret sharing
US10771235B2 (en) * 2016-09-01 2020-09-08 Cryptography Research Inc. Protecting block cipher computation operations from external monitoring attacks
EP3555785A1 (en) 2016-12-15 2019-10-23 Irdeto B.V. Software integrity verification
US10615980B2 (en) * 2017-02-02 2020-04-07 Mastercard International Incorporated Methods and systems for securely storing sensitive data on smart cards
FR3063857B1 (en) * 2017-03-08 2020-02-14 Safran Identity & Security METHOD FOR ELECTRONIC SIGNING OF A DOCUMENT WITH A PREDETERMINED SECRET KEY
GB201703864D0 (en) 2017-03-10 2017-04-26 Irdeto Bv Secured system operation
US10862646B2 (en) * 2017-07-11 2020-12-08 Nokia Technologies Oy Polar coded broadcast channel
US11436946B2 (en) * 2017-08-10 2022-09-06 Sony Corporation Encryption device, encryption method, decryption device, and decryption method
EP3682414B1 (en) 2017-09-12 2022-11-09 Irdeto B.V. Device and method for gpu-based watermarking
US10528600B1 (en) * 2017-09-13 2020-01-07 Hrl Laboratories, Llc System to identify unknown communication behavior relationships from time series
US11195107B1 (en) * 2017-09-13 2021-12-07 Hrl Laboratories, Llc Method of malicious social activity prediction using spatial-temporal social network data
DE102017009315B4 (en) * 2017-10-06 2019-11-21 Sergej Gertje Protection of automation programs against reverse development
US10778409B2 (en) 2017-12-15 2020-09-15 Crypto Lab Inc. Terminal device performing homomorphic encryption, server device processing ciphertext and methods thereof
US11010233B1 (en) 2018-01-18 2021-05-18 Pure Storage, Inc Hardware-based system monitoring
US11176300B2 (en) * 2018-02-03 2021-11-16 Irdeto B.V. Systems and methods for creating individualized processing chips and assemblies
US10797868B2 (en) 2018-05-31 2020-10-06 Irdeto B.V. Shared secret establishment
US11206130B2 (en) 2018-07-31 2021-12-21 Nxp B.V. Customizing cryptographic keys between multiple hosts
US10869036B2 (en) 2018-09-18 2020-12-15 Google Llc Receptive-field-conforming convolutional models for video coding
US11025907B2 (en) * 2019-02-28 2021-06-01 Google Llc Receptive-field-conforming convolution models for video coding
US11764940B2 (en) 2019-01-10 2023-09-19 Duality Technologies, Inc. Secure search of secret data in a semi-trusted environment using homomorphic encryption
US20200313850A1 (en) * 2019-03-29 2020-10-01 Irdeto Canada Corporation Method and apparatus for implementing a white-box cipher
WO2020205984A1 (en) * 2019-04-01 2020-10-08 Cryptomove, Inc. Security via data concealment using integrated circuits
US10764029B1 (en) * 2019-04-02 2020-09-01 Carey Patrick Atkins Asymmetric Encryption Algorithm
WO2020215146A1 (en) * 2019-04-23 2020-10-29 Quantropi Inc. Enhanced randomness for digital systems
US11283619B2 (en) * 2019-06-20 2022-03-22 The Boeing Company Bit mixer based parallel MAC and hash functions
US11263316B2 (en) 2019-08-20 2022-03-01 Irdeto B.V. Securing software routines
CN110620671B (en) * 2019-08-30 2024-04-09 厦门一通灵信息科技有限公司 Encryption algorithm evaluation method, medium, equipment and device
JP7383985B2 (en) * 2019-10-30 2023-11-21 富士電機株式会社 Information processing device, information processing method and program
US11687418B2 (en) 2019-11-22 2023-06-27 Pure Storage, Inc. Automatic generation of recovery plans specific to individual storage elements
US11500788B2 (en) 2019-11-22 2022-11-15 Pure Storage, Inc. Logical address based authorization of operations with respect to a storage system
US11720692B2 (en) 2019-11-22 2023-08-08 Pure Storage, Inc. Hardware token based management of recovery datasets for a storage system
US11651075B2 (en) 2019-11-22 2023-05-16 Pure Storage, Inc. Extensible attack monitoring by a storage system
US11720714B2 (en) 2019-11-22 2023-08-08 Pure Storage, Inc. Inter-I/O relationship based detection of a security threat to a storage system
US11625481B2 (en) 2019-11-22 2023-04-11 Pure Storage, Inc. Selective throttling of operations potentially related to a security threat to a storage system
US11645162B2 (en) 2019-11-22 2023-05-09 Pure Storage, Inc. Recovery point determination for data restoration in a storage system
US11341236B2 (en) 2019-11-22 2022-05-24 Pure Storage, Inc. Traffic-based detection of a security threat to a storage system
US11675898B2 (en) 2019-11-22 2023-06-13 Pure Storage, Inc. Recovery dataset management for security threat monitoring
US11657155B2 (en) 2019-11-22 2023-05-23 Pure Storage, Inc Snapshot delta metric based determination of a possible ransomware attack against data maintained by a storage system
US11520907B1 (en) 2019-11-22 2022-12-06 Pure Storage, Inc. Storage system snapshot retention based on encrypted data
US11615185B2 (en) 2019-11-22 2023-03-28 Pure Storage, Inc. Multi-layer security threat detection for a storage system
US11941116B2 (en) 2019-11-22 2024-03-26 Pure Storage, Inc. Ransomware-based data protection parameter modification
US11755751B2 (en) 2019-11-22 2023-09-12 Pure Storage, Inc. Modify access restrictions in response to a possible attack against data stored by a storage system
US11204985B2 (en) * 2020-03-31 2021-12-21 Irdeto Canada Corporation Systems, methods, and storage media for creating secured computer code having entangled transformations
US11902424B2 (en) * 2020-11-20 2024-02-13 International Business Machines Corporation Secure re-encryption of homomorphically encrypted data
US11722292B2 (en) 2021-01-29 2023-08-08 Robert Bosch Gmbh System and method for improving the efficiency of advanced encryption standard in multi-party computation with precomputed data
US20220255726A1 (en) * 2021-01-29 2022-08-11 Robert Bosch Gmbh System and method for improving the efficiency of advanced encryption standard in multi-party computation
IT202100012488A1 (en) * 2021-05-14 2022-11-14 Torino Politecnico Method of configuring neural networks and method of processing binary files
EP4339835A1 (en) 2022-09-16 2024-03-20 Irdeto B.V. Machine learning model protection

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5892899A (en) * 1996-06-13 1999-04-06 Intel Corporation Tamper resistant methods and apparatus
US6192475B1 (en) * 1997-03-31 2001-02-20 David R. Wallace System and method for cloaking software
US6668325B1 (en) * 1997-06-09 2003-12-23 Intertrust Technologies Obfuscation techniques for enhancing software security
FR2776445A1 (en) * 1998-03-17 1999-09-24 Schlumberger Ind Sa Cryptographic algorithm security technique
JP3600454B2 (en) * 1998-08-20 2004-12-15 株式会社東芝 Encryption / decryption device, encryption / decryption method, and program storage medium therefor
WO2000041356A1 (en) * 1998-12-30 2000-07-13 Koninklijke Kpn N.V. Method and device for cryptographically processing data
CA2447451C (en) * 2000-05-12 2013-02-12 Xtreamlok Pty. Ltd. Information security method and system
CA2327911A1 (en) 2000-12-08 2002-06-08 Cloakware Corporation Obscuring functions in computer software
CA2369304A1 (en) * 2002-01-30 2003-07-30 Cloakware Corporation A protocol to hide cryptographic private keys
FR2849232B1 (en) * 2002-12-24 2005-02-25 Trusted Logic METHOD FOR SECURING COMPUTER SYSTEMS INCORPORATING A CODE INTERPRETATION MODULE
US7631292B2 (en) * 2003-11-05 2009-12-08 Microsoft Corporation Code individualism and execution protection
US20050223361A1 (en) * 2004-04-01 2005-10-06 Belbute John L Software testing based on changes in execution paths
US8015211B2 (en) * 2004-04-21 2011-09-06 Architecture Technology Corporation Secure peer-to-peer object storage system

Also Published As

Publication number Publication date
US7809135B2 (en) 2010-10-05
EP1350154A2 (en) 2003-10-08
AU2002221414A1 (en) 2002-06-18
US20060140401A1 (en) 2006-06-29
WO2002046890A2 (en) 2002-06-13
CA2327911A1 (en) 2002-06-08
US7397916B2 (en) 2008-07-08
US20040139340A1 (en) 2004-07-15
CA2431443A1 (en) 2002-06-13

Similar Documents

Publication Publication Date Title
WO2002046890A8 (en) System and method for protecting computer software from a white box attack
AU7925100A (en) A method and system for software updating
AU2001227597A1 (en) Protection domains for a computer operating system
AU3396301A (en) A system and method for authenticating electronic documents
AU2001266692A1 (en) System and method for licensing management
WO2003046700A8 (en) Method and system for protecting data from unauthorized disclosure
AU2452001A (en) A method and system for modeling data
AU3111800A (en) A computer implemented method
GB2384886B (en) System and method for securing a computer
AU6098700A (en) System and method for generating fictitious content for a computer
AU7756000A (en) Method and system for operating a content management system
AU2002214358A1 (en) Watermarking system and method for protecting a digital image from forgery or alteration
AU1847101A (en) Method and system for generating a secure electronic signature
AU2001286898A1 (en) System and method for preventing unauthorized access to electronic data
AU7101800A (en) System and method for protecting a cranking subsystem
AU2002215739A1 (en) Method and system for creating a virtual team environment
WO2002007460A8 (en) A system and method for context association
AU2002212592A1 (en) A method of and a system for distributing electronic content
AU9208298A (en) Method for protecting content using watermarking
AU7130200A (en) Sound system and method for creating a sound event based on a modeled sound field
AU2001239781A1 (en) Method and system for facilitating a sale
AU4347001A (en) Method and system for modeling a legacy computer system
GB0109620D0 (en) A method and system for distributing software features to a computer
AU2002220761A1 (en) A method and system for distributing electronic content
AU5772000A (en) System and method for regulating access and for creating a secure and convenientcomputing environment

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A2

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A2

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
D17 Declaration under article 17(2)a
WWE Wipo information: entry into national phase

Ref document number: 2431443

Country of ref document: CA

WWE Wipo information: entry into national phase

Ref document number: 2001999868

Country of ref document: EP

WWP Wipo information: published in national office

Ref document number: 2001999868

Country of ref document: EP

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

WWE Wipo information: entry into national phase

Ref document number: 10433966

Country of ref document: US

WWW Wipo information: withdrawn in national office

Ref document number: 2001999868

Country of ref document: EP

NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP