WO2002046890A8 - System and method for protecting computer software from a white box attack - Google Patents
System and method for protecting computer software from a white box attackInfo
- Publication number
- WO2002046890A8 WO2002046890A8 PCT/CA2001/001729 CA0101729W WO0246890A8 WO 2002046890 A8 WO2002046890 A8 WO 2002046890A8 CA 0101729 W CA0101729 W CA 0101729W WO 0246890 A8 WO0246890 A8 WO 0246890A8
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- computer software
- white box
- protecting computer
- box attack
- attack
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09C—CIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
- G09C1/00—Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
- H04L9/003—Countermeasures against attacks on cryptographic mechanisms for power analysis, e.g. differential power analysis [DPA] or simple power analysis [SPA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0625—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0631—Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/08—Randomization, e.g. dummy operations or using noise
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/16—Obfuscation or hiding, e.g. involving white box
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002431443A CA2431443A1 (en) | 2000-12-08 | 2001-12-10 | System and method for protecting computer software from a white box attack |
EP01999868A EP1350154A2 (en) | 2000-12-08 | 2001-12-10 | System and method for protecting computer software from a white box attack |
AU2002221414A AU2002221414A1 (en) | 2000-12-08 | 2001-12-10 | System and method for protecting computer software from a white box attack |
US10/433,966 US7397916B2 (en) | 2000-12-08 | 2001-12-10 | System and method for protecting computer software from a white box attack |
US11/020,313 US7809135B2 (en) | 2000-12-08 | 2004-12-27 | System and method for protecting computer software from a white box attack |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA2,327,911 | 2000-12-08 | ||
CA002327911A CA2327911A1 (en) | 2000-12-08 | 2000-12-08 | Obscuring functions in computer software |
Publications (2)
Publication Number | Publication Date |
---|---|
WO2002046890A2 WO2002046890A2 (en) | 2002-06-13 |
WO2002046890A8 true WO2002046890A8 (en) | 2003-03-06 |
Family
ID=4167864
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CA2001/001729 WO2002046890A2 (en) | 2000-12-08 | 2001-12-10 | System and method for protecting computer software from a white box attack |
Country Status (5)
Country | Link |
---|---|
US (2) | US7397916B2 (en) |
EP (1) | EP1350154A2 (en) |
AU (1) | AU2002221414A1 (en) |
CA (2) | CA2327911A1 (en) |
WO (1) | WO2002046890A2 (en) |
Families Citing this family (195)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2327911A1 (en) | 2000-12-08 | 2002-06-08 | Cloakware Corporation | Obscuring functions in computer software |
US7340058B2 (en) * | 2001-04-09 | 2008-03-04 | Lucent Technologies Inc. | Low-overhead secure information processing for mobile gaming and other lightweight device applications |
AUPR970601A0 (en) * | 2001-12-21 | 2002-01-24 | Canon Kabushiki Kaisha | Encoding information in a watermark |
US6970985B2 (en) | 2002-07-09 | 2005-11-29 | Bluerisc Inc. | Statically speculative memory accessing |
FR2850811A1 (en) * | 2003-01-30 | 2004-08-06 | St Microelectronics Sa | Integrated circuit e.g. chip card, anti-fraud method, involves performing masking of data and unmasking of encryption function result by random number, using two functionally identical operators having respective physical traces |
EP1595357A4 (en) * | 2003-02-06 | 2006-03-01 | Discretix Technologies Ltd | Device and method of manipulating masked data |
US8510571B1 (en) | 2003-03-24 | 2013-08-13 | Hoi Chang | System and method for inserting security mechanisms into a software program |
US7469266B2 (en) * | 2003-09-29 | 2008-12-23 | International Business Machines Corporation | Method and structure for producing high performance linear algebra routines using register block data format routines |
US20050114850A1 (en) | 2003-10-29 | 2005-05-26 | Saurabh Chheda | Energy-focused re-compilation of executables and hardware mechanisms based on compiler-architecture interaction and compiler-inserted control |
US7996671B2 (en) | 2003-11-17 | 2011-08-09 | Bluerisc Inc. | Security of program executables and microprocessors based on compiler-architecture interaction |
US8700533B2 (en) * | 2003-12-04 | 2014-04-15 | Black Duck Software, Inc. | Authenticating licenses for legally-protectable content based on license profiles and content identifiers |
US9489687B2 (en) * | 2003-12-04 | 2016-11-08 | Black Duck Software, Inc. | Methods and systems for managing software development |
WO2005060147A1 (en) * | 2003-12-11 | 2005-06-30 | Koninklijke Philips Electronics N.V. | Block ciphering system, using permutations to hide the core ciphering function of each encryption round |
US8607209B2 (en) | 2004-02-04 | 2013-12-10 | Bluerisc Inc. | Energy-focused compiler-assisted branch prediction |
DE102004011488B4 (en) * | 2004-03-09 | 2007-07-05 | Giesecke & Devrient Gmbh | Protection of software against attacks |
US8887287B2 (en) * | 2004-10-27 | 2014-11-11 | Alcatel Lucent | Method and apparatus for software integrity protection using timed executable agents |
WO2006046187A1 (en) * | 2004-10-28 | 2006-05-04 | Koninklijke Philips Electronics N.V. | Method and system for obfuscating a cryptographic function |
US8155306B2 (en) * | 2004-12-09 | 2012-04-10 | Intel Corporation | Method and apparatus for increasing the speed of cryptographic processing |
FR2879383A1 (en) * | 2004-12-14 | 2006-06-16 | St Microelectronics Sa | MASKING OF BINARY WORDS PROCESSED BY AN INTEGRATED CIRCUIT |
US20060161612A1 (en) * | 2005-01-14 | 2006-07-20 | International Business Machines Corporation | Method and structure for a generalized cache-register file interface with data restructuring methods for multiple cache levels and hardware pre-fetching |
US20060168401A1 (en) * | 2005-01-26 | 2006-07-27 | International Business Machines Corporation | Method and structure for high-performance linear algebra in the presence of limited outstanding miss slots |
CN100555300C (en) * | 2005-03-25 | 2009-10-28 | 松下电器产业株式会社 | Program conversion apparatus, secure processing device, computer program and recording medium |
EP1742412B1 (en) * | 2005-07-05 | 2009-01-14 | St Microelectronics S.A. | Verification of a digital message stored in a memory zone |
US7769165B2 (en) * | 2005-10-14 | 2010-08-03 | Microsoft Corporation | Semi-public white-box cipher |
US7743253B2 (en) * | 2005-11-04 | 2010-06-22 | Microsoft Corporation | Digital signature for network coding |
US7853018B2 (en) * | 2005-11-10 | 2010-12-14 | Atallah Mikhail J | Method and apparatus for hiding a private key |
FR2893796B1 (en) * | 2005-11-21 | 2008-01-04 | Atmel Corp | ENCRYPTION PROTECTION METHOD |
DE602006020010D1 (en) * | 2005-12-19 | 2011-03-24 | St Microelectronics Sa | Protection of the execution of a DES algorithm |
EP1997265B1 (en) * | 2006-03-10 | 2020-08-05 | Irdeto B.V. | Integrity of a data processing system using white-box for digital content protection |
KR20080113277A (en) * | 2006-04-28 | 2008-12-29 | 파나소닉 주식회사 | System for making program difficult to read, device for making program difficult to read, and method for making program difficult to read |
CN101491001B (en) * | 2006-07-12 | 2012-03-14 | 耶德托公司 | Tamper resistance of a digital data processing unit |
WO2008007305A2 (en) * | 2006-07-12 | 2008-01-17 | Koninklijke Philips Electronics N.V. | Method and system for obfuscating a gryptographic function |
US8997255B2 (en) | 2006-07-31 | 2015-03-31 | Inside Secure | Verifying data integrity in a data storage device |
US8352752B2 (en) * | 2006-09-01 | 2013-01-08 | Inside Secure | Detecting radiation-based attacks |
US8010803B2 (en) * | 2006-10-12 | 2011-08-30 | Black Duck Software, Inc. | Methods and apparatus for automated export compliance |
US7681045B2 (en) * | 2006-10-12 | 2010-03-16 | Black Duck Software, Inc. | Software algorithm identification |
US9361617B2 (en) * | 2008-06-17 | 2016-06-07 | Verifone, Inc. | Variable-length cipher system and method |
US20080126766A1 (en) * | 2006-11-03 | 2008-05-29 | Saurabh Chheda | Securing microprocessors against information leakage and physical tampering |
KR101213156B1 (en) * | 2006-12-21 | 2012-12-17 | 삼성전자주식회사 | Distributed rivest shamir adleman signature method and signature generative node |
CN101578813A (en) * | 2007-01-11 | 2009-11-11 | 皇家飞利浦电子股份有限公司 | Tracing copies of an implementation |
JP5133973B2 (en) * | 2007-01-18 | 2013-01-30 | パナソニック株式会社 | Obfuscation support device, obfuscation support method, program, and integrated circuit |
KR101338409B1 (en) * | 2007-01-25 | 2013-12-10 | 삼성전자주식회사 | Method and node for generating distributed rivest shamir adleman signature in ad-hoc network |
US8752032B2 (en) | 2007-02-23 | 2014-06-10 | Irdeto Canada Corporation | System and method of interlocking to protect software-mediated program and device behaviours |
WO2008101340A1 (en) * | 2007-02-23 | 2008-08-28 | Cloakware Corporation | System and method for interlocking to protect software-mediated program and device behaviours |
US20080301448A1 (en) * | 2007-06-01 | 2008-12-04 | Microsoft Corporation | Security Against Corruption for Networked Storage |
KR100969961B1 (en) * | 2007-12-20 | 2010-07-15 | 한국전자통신연구원 | Substitution apparatus of block code aria and method thereof |
CN101978647A (en) * | 2008-01-31 | 2011-02-16 | 耶德托公司 | Securing a smart card |
WO2009098630A1 (en) | 2008-02-06 | 2009-08-13 | Nxp B.V. | Data processing device and method for executing obfuscated programs |
CN101939749A (en) | 2008-02-11 | 2011-01-05 | Nxp股份有限公司 | Method of program obfuscation and processing device for executing obfuscated programs |
US8800048B2 (en) * | 2008-05-20 | 2014-08-05 | Microsoft Corporation | Software protection through interdependent parameter cloud constrained software execution |
JP5460699B2 (en) * | 2008-05-23 | 2014-04-02 | イルデト カナダ コーポレーション | System and method for generating a white-box implementation of a software application |
EP2662796A3 (en) | 2008-06-24 | 2014-03-05 | Nds Limited | Security within integrated circuits |
US8171306B2 (en) * | 2008-11-05 | 2012-05-01 | Microsoft Corporation | Universal secure token for obfuscation and tamper resistance |
JP4687775B2 (en) * | 2008-11-20 | 2011-05-25 | ソニー株式会社 | Cryptographic processing device |
US8151333B2 (en) * | 2008-11-24 | 2012-04-03 | Microsoft Corporation | Distributed single sign on technologies including privacy protection and proactive updating |
EP2406916A1 (en) * | 2009-03-10 | 2012-01-18 | Irdeto Corporate B.V. | White-box cryptographic system with input dependent encodings |
EP2415199B1 (en) * | 2009-03-31 | 2017-10-18 | Koninklijke Philips N.V. | Method for performing a cryptographic task in an electronic component |
DE102009019981A1 (en) * | 2009-05-05 | 2010-11-11 | Giesecke & Devrient Gmbh | Method for protecting software and portable data carriers stored on a portable data carrier |
CN102483790B (en) | 2009-05-06 | 2016-01-20 | 爱迪德技术有限公司 | Utilize the cryptological interlocking scale-of-two protection of white box |
WO2010146140A1 (en) * | 2009-06-19 | 2010-12-23 | Irdeto B.V. | White-box cryptographic system with configurable key using block selection |
CN102484581B (en) * | 2009-06-19 | 2015-07-01 | 耶德托公司 | White-box Cryptographic System With Configurable Key Using Intermediate Data Modification |
CA2774728C (en) | 2009-11-13 | 2019-02-12 | Irdeto Canada Corporation | System and method to protect java bytecode code against static and dynamic attacks within hostile execution environments |
US8549322B2 (en) * | 2010-03-25 | 2013-10-01 | International Business Machines Corporation | Secure data scanning method and system |
EP3812894B1 (en) | 2010-03-31 | 2024-02-07 | Irdeto B.V. | A system and method for encapsulating and enabling protection through diverse variations in software libraries |
US9009481B2 (en) | 2010-03-31 | 2015-04-14 | Irdeto Canada Corporation | System and method for protecting cryptographic assets from a white-box attack |
EP2388730A1 (en) * | 2010-05-17 | 2011-11-23 | Nagravision S.A. | Method for generating software code |
US20120079462A1 (en) * | 2010-09-24 | 2012-03-29 | SoftKrypt LLC | Systems and methods of source software code obfuscation |
FR2966953B1 (en) | 2010-11-02 | 2015-08-28 | St Microelectronics Rousset | METHOD OF CRYPTOGRAPHIC COUNTERPRESSION BY DERIVATION OF SECRET DATA |
MY150357A (en) * | 2010-11-04 | 2013-12-31 | Mimos Berhad | A method for linear transformation in substitution-permutation networks symmetric-key block cipher |
EP2458774A1 (en) | 2010-11-24 | 2012-05-30 | Nagravision S.A. | A method of processing a cryptographic function in obfuscated form |
US20120201373A1 (en) * | 2011-02-03 | 2012-08-09 | Futurewei Technologies, Inc. | Design of a Good General-Purpose Hash Function with Limited Resources |
CA2830761C (en) | 2011-03-24 | 2019-01-15 | Irdeto B.V. | System and method providing dependency networks throughout applications for attack resistance |
EP2506174B1 (en) | 2011-03-30 | 2019-01-09 | Irdeto B.V. | Enabling a software application to be executed on a hardware device |
US8621237B1 (en) * | 2011-06-30 | 2013-12-31 | Emc Corporation | Protecting against cryptographic key exposure in source code |
US20130097431A1 (en) * | 2011-10-18 | 2013-04-18 | Paul Marion Hriljac | Systems and methods of source software code modification |
WO2013116916A1 (en) * | 2012-02-09 | 2013-08-15 | Irdeto Canada Corporation | System and method for generating and protecting cryptographic keys |
CN104303148B (en) * | 2012-03-22 | 2018-10-19 | 爱迪德技术有限公司 | Update component software |
EP2831797B1 (en) | 2012-03-30 | 2018-05-02 | Irdeto B.V. | Securing accessible systems using dynamic data mangling |
US8976960B2 (en) | 2012-04-02 | 2015-03-10 | Apple Inc. | Methods and apparatus for correlation protected processing of cryptographic operations |
RU2014152808A (en) * | 2012-05-25 | 2016-07-20 | Конинклейке Филипс Н.В. | METHOD, SYSTEM AND DEVICE FOR PROTECTION FROM REVERSE ENGINEERING AND / OR INTERFERENCE IN PROGRAMS |
DE102012209404A1 (en) * | 2012-06-04 | 2013-12-05 | Robert Bosch Gmbh | Apparatus for executing a cryptographic method and method of operation therefor |
US9367842B2 (en) | 2012-06-12 | 2016-06-14 | Square, Inc. | Software pin entry |
US20140324708A1 (en) * | 2012-06-12 | 2014-10-30 | Square, Inc. | Raw sensor input encryption for passcode entry security |
US8938796B2 (en) | 2012-09-20 | 2015-01-20 | Paul Case, SR. | Case secure computer architecture |
US20140192974A1 (en) * | 2012-10-17 | 2014-07-10 | Elliptic Technologies Inc. | System and method for cryptographic processing in a time window |
US9311489B2 (en) | 2013-03-07 | 2016-04-12 | Microsoft Technology Licensing, Llc | Application forensics |
US9998279B2 (en) | 2013-05-01 | 2018-06-12 | Koninklijke Philips N.V. | Electronic block cipher device suitable for obfuscation |
RU2518950C9 (en) * | 2013-05-06 | 2014-09-10 | Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Санкт-Петербургский государственный электротехнический университет "ЛЭТИ" им. В.И. Ульянова (Ленина)" | Method of encrypting n-bit unit m |
KR102133200B1 (en) | 2013-08-08 | 2020-07-13 | 서울대학교산학협력단 | Method and apparatus for protecting of data |
CN104376015B (en) * | 2013-08-15 | 2020-03-17 | 腾讯科技(深圳)有限公司 | Method and device for processing nodes in relational network |
US9773240B1 (en) | 2013-09-13 | 2017-09-26 | Square, Inc. | Fake sensor input for passcode entry security |
US9613356B2 (en) | 2013-09-30 | 2017-04-04 | Square, Inc. | Secure passcode entry user interface |
US9928501B1 (en) | 2013-10-09 | 2018-03-27 | Square, Inc. | Secure passcode entry docking station |
DE102013222218A1 (en) * | 2013-10-31 | 2014-05-22 | Siemens Aktiengesellschaft | Method for constructing circuit used for generating random bits used in asymmetric authentication method, involves linking specific functions with a pretext of a related function as another function, to perform fixed point free mapping |
KR101807259B1 (en) * | 2013-11-04 | 2017-12-08 | 한국전자통신연구원 | Apparatus and methdo for encoding |
US9223995B1 (en) * | 2013-12-10 | 2015-12-29 | Progress Software Corporation | Semantic obfuscation of data in real time |
US9900149B2 (en) * | 2013-12-24 | 2018-02-20 | Synopsys, Inc. | Area efficient cryptographic method and apparatus |
US10075288B1 (en) * | 2014-02-28 | 2018-09-11 | The Governing Council Of The University Of Toronto | Systems, devices, and processes for homomorphic encryption |
US9838198B2 (en) * | 2014-03-19 | 2017-12-05 | Nxp B.V. | Splitting S-boxes in a white-box implementation to resist attacks |
FR3018934B1 (en) * | 2014-03-24 | 2017-05-26 | Morpho | METHOD OF INPUTTING DATA IN A BASE FOR THE PROTECTION OF THESE DATA |
GB201405705D0 (en) * | 2014-03-31 | 2014-05-14 | Irdeto Bv | Secured printed electronics device |
GB201405755D0 (en) | 2014-03-31 | 2014-05-14 | Irdeto Bv | Optimizing and protecting software |
WO2015149826A1 (en) * | 2014-03-31 | 2015-10-08 | Irdeto B.V. | Protecting an item of software |
GB201405706D0 (en) * | 2014-03-31 | 2014-05-14 | Irdeto Bv | Software protection |
EP3127271B1 (en) * | 2014-03-31 | 2018-07-25 | Irdeto B.V. | Obfuscated performance of a predetermined function |
RU2542880C1 (en) * | 2014-03-31 | 2015-02-27 | Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Санкт-Петербургский государственный электротехнический университет"ЛЭТИ" им. В.И. Ульянова (Ленина)" | Method of encrypting binary data unit |
RU2542929C1 (en) * | 2014-04-14 | 2015-02-27 | Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Санкт-Петербургский государственный электротехнический университет "ЛЭТИ" им. В.И. Ульянова (Ленина)" | Method to code data unit represented as bit string |
RU2542926C1 (en) * | 2014-04-14 | 2015-02-27 | Федеральное государственное бюджетное образовательное учреждение высшего профессионального образования "Санкт-Петербургский государственный электротехнический университет "ЛЭТИ" им. В.И. Ульянова (Ленина)" | Method to code message represented as multidigit binary number |
US9338145B2 (en) | 2014-04-28 | 2016-05-10 | Nxp B.V. | Security patch without changing the key |
EP2940920B1 (en) * | 2014-04-28 | 2017-03-08 | Nxp B.V. | Security patch without changing the key |
US9485226B2 (en) * | 2014-04-28 | 2016-11-01 | Nxp B.V. | Method for including an implicit integrity or authenticity check into a white-box implementation |
US9641337B2 (en) * | 2014-04-28 | 2017-05-02 | Nxp B.V. | Interface compatible approach for gluing white-box implementation to surrounding program |
US9858440B1 (en) * | 2014-05-23 | 2018-01-02 | Shape Security, Inc. | Encoding of sensitive data |
US10412054B2 (en) * | 2014-06-24 | 2019-09-10 | Nxp B.V. | Method for introducing dependence of white-box implementation on a set of strings |
KR101527329B1 (en) * | 2014-09-12 | 2015-06-09 | 삼성에스디에스 주식회사 | Apparatus and method for data encryption |
US9252943B1 (en) * | 2014-09-26 | 2016-02-02 | The Boeing Company | Parallelizable cipher construction |
EP3198498B1 (en) | 2014-09-26 | 2021-04-14 | Irdeto B.V. | A challenge-response method and associated computing device |
EP3201758A1 (en) | 2014-09-30 | 2017-08-09 | Koninklijke Philips N.V. | Electronic calculating device for performing obfuscated arithmetic |
EP3207514A4 (en) * | 2014-10-13 | 2018-07-04 | Sequent Software Inc. | Securing host card emulation credentials |
CN104301095A (en) * | 2014-10-13 | 2015-01-21 | 深圳中科讯联科技有限公司 | DES round operation method and circuit |
GB201418815D0 (en) | 2014-10-22 | 2014-12-03 | Irdeto Bv | Providing access to content |
DE102014016548A1 (en) * | 2014-11-10 | 2016-05-12 | Giesecke & Devrient Gmbh | Method for testing and hardening software applications |
US9600672B1 (en) * | 2014-12-04 | 2017-03-21 | Amazon Technologies, Inc. | Dynamic function switching |
RU2710310C2 (en) | 2014-12-12 | 2019-12-25 | Конинклейке Филипс Н.В. | Electronic forming device |
JP6387466B2 (en) * | 2014-12-22 | 2018-09-05 | コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. | Electronic computing device |
CN107113160B (en) | 2014-12-22 | 2020-05-15 | 皇家飞利浦有限公司 | System, method and computer storage medium for hidden program execution |
US10318271B2 (en) | 2015-01-05 | 2019-06-11 | Irdeto Canada Corporation | Updating software components in a program |
US9665699B2 (en) * | 2015-03-13 | 2017-05-30 | Nxp B.V. | Implementing padding in a white-box implementation |
GB201505434D0 (en) * | 2015-03-30 | 2015-05-13 | Irdeto Bv | Cryptographic processing |
CN108064381B (en) | 2015-03-30 | 2021-06-18 | 爱迪德技术有限公司 | Method for data protection |
GB201505553D0 (en) | 2015-03-31 | 2015-05-13 | Irdeto Bv | Online advertisements |
US10372886B2 (en) * | 2015-05-05 | 2019-08-06 | Nxp B.V. | Protecting the input/output of modular encoded white-box RSA/ECC |
EP3298720B1 (en) * | 2015-05-19 | 2019-03-06 | Koninklijke Philips N.V. | Computing with encrypted values |
US10037330B1 (en) | 2015-05-19 | 2018-07-31 | Cryptomove, Inc. | Security via dynamic data movement in a cloud-based environment |
US10664439B2 (en) | 2015-05-19 | 2020-05-26 | Cryptomove, Inc. | Security via dynamic data movement in a cloud-based environment |
WO2016187315A1 (en) | 2015-05-19 | 2016-11-24 | Cryptomove, Inc. | Security via data concealment |
US10642786B2 (en) * | 2015-05-19 | 2020-05-05 | Cryptomove, Inc. | Security via data concealment using integrated circuits |
RU2580060C1 (en) * | 2015-05-20 | 2016-04-10 | Федеральное государственное автономное образовательное учреждение высшего образования "Санкт-Петербургский государственный электротехнический университет "ЛЭТИ" им. В.И. Ульнова (Ленина)" | Method to encrypt messages, represented as a multi-bit binary number |
WO2017007521A1 (en) * | 2015-07-09 | 2017-01-12 | Hrl Laboratories, Llc | Non-malleable obfuscator for sparse functions |
US10509918B1 (en) * | 2015-09-18 | 2019-12-17 | Hrl Laboratories, Llc | One-time obfuscation for polynomial-size ordered binary decision diagrams (POBDDs) |
DE102015014038A1 (en) * | 2015-10-30 | 2017-05-04 | Giesecke & Devrient Gmbh | Alternative representation of the crypto algorithm DES |
NL2015745B1 (en) | 2015-11-09 | 2017-05-26 | Koninklijke Philips Nv | A cryptographic device arranged to compute a target block cipher. |
US10015009B2 (en) * | 2015-11-25 | 2018-07-03 | Nxp B.V. | Protecting white-box feistel network implementation against fault attack |
JP6890589B2 (en) | 2015-12-15 | 2021-06-18 | コーニンクレッカ フィリップス エヌ ヴェKoninklijke Philips N.V. | Computational devices and methods |
US10728028B2 (en) * | 2016-02-18 | 2020-07-28 | Gideon Samid | Transmitter for encoding information with randomly flipped bits and transmitting that information through a communications channel |
US10229282B2 (en) * | 2016-06-12 | 2019-03-12 | Apple Inc. | Efficient implementation for differential privacy using cryptographic functions |
EP3475825B1 (en) | 2016-06-23 | 2023-01-25 | Cryptography Research, Inc. | Cryptographic operations employing non-linear share encoding for protecting from external monitoring attacks |
CN107547190A (en) * | 2016-06-28 | 2018-01-05 | 埃沙尔公司 | For protecting method of the replacement operation for using substitution table from side Multiple Channel Analysis |
US10243937B2 (en) * | 2016-07-08 | 2019-03-26 | Nxp B.V. | Equality check implemented with secret sharing |
US10771235B2 (en) * | 2016-09-01 | 2020-09-08 | Cryptography Research Inc. | Protecting block cipher computation operations from external monitoring attacks |
EP3555785A1 (en) | 2016-12-15 | 2019-10-23 | Irdeto B.V. | Software integrity verification |
US10615980B2 (en) * | 2017-02-02 | 2020-04-07 | Mastercard International Incorporated | Methods and systems for securely storing sensitive data on smart cards |
FR3063857B1 (en) * | 2017-03-08 | 2020-02-14 | Safran Identity & Security | METHOD FOR ELECTRONIC SIGNING OF A DOCUMENT WITH A PREDETERMINED SECRET KEY |
GB201703864D0 (en) | 2017-03-10 | 2017-04-26 | Irdeto Bv | Secured system operation |
US10862646B2 (en) * | 2017-07-11 | 2020-12-08 | Nokia Technologies Oy | Polar coded broadcast channel |
US11436946B2 (en) * | 2017-08-10 | 2022-09-06 | Sony Corporation | Encryption device, encryption method, decryption device, and decryption method |
CA3075457A1 (en) | 2017-09-12 | 2019-03-21 | Irdeto B.V. | Device and method for gpu-based watermarking |
US10528600B1 (en) * | 2017-09-13 | 2020-01-07 | Hrl Laboratories, Llc | System to identify unknown communication behavior relationships from time series |
US11195107B1 (en) * | 2017-09-13 | 2021-12-07 | Hrl Laboratories, Llc | Method of malicious social activity prediction using spatial-temporal social network data |
DE102017009315B4 (en) * | 2017-10-06 | 2019-11-21 | Sergej Gertje | Protection of automation programs against reverse development |
US10778409B2 (en) | 2017-12-15 | 2020-09-15 | Crypto Lab Inc. | Terminal device performing homomorphic encryption, server device processing ciphertext and methods thereof |
US11010233B1 (en) | 2018-01-18 | 2021-05-18 | Pure Storage, Inc | Hardware-based system monitoring |
US11176300B2 (en) * | 2018-02-03 | 2021-11-16 | Irdeto B.V. | Systems and methods for creating individualized processing chips and assemblies |
US10797868B2 (en) | 2018-05-31 | 2020-10-06 | Irdeto B.V. | Shared secret establishment |
US11206130B2 (en) | 2018-07-31 | 2021-12-21 | Nxp B.V. | Customizing cryptographic keys between multiple hosts |
US10869036B2 (en) | 2018-09-18 | 2020-12-15 | Google Llc | Receptive-field-conforming convolutional models for video coding |
US11025907B2 (en) * | 2019-02-28 | 2021-06-01 | Google Llc | Receptive-field-conforming convolution models for video coding |
US11764940B2 (en) | 2019-01-10 | 2023-09-19 | Duality Technologies, Inc. | Secure search of secret data in a semi-trusted environment using homomorphic encryption |
US20200313850A1 (en) * | 2019-03-29 | 2020-10-01 | Irdeto Canada Corporation | Method and apparatus for implementing a white-box cipher |
WO2020205984A1 (en) * | 2019-04-01 | 2020-10-08 | Cryptomove, Inc. | Security via data concealment using integrated circuits |
US10764029B1 (en) * | 2019-04-02 | 2020-09-01 | Carey Patrick Atkins | Asymmetric Encryption Algorithm |
CN113728583B (en) * | 2019-04-23 | 2022-12-02 | 量子熵有限公司 | Enhanced randomness for digital systems |
US11283619B2 (en) * | 2019-06-20 | 2022-03-22 | The Boeing Company | Bit mixer based parallel MAC and hash functions |
US11263316B2 (en) | 2019-08-20 | 2022-03-01 | Irdeto B.V. | Securing software routines |
JP7383985B2 (en) * | 2019-10-30 | 2023-11-21 | 富士電機株式会社 | Information processing device, information processing method and program |
US11520907B1 (en) | 2019-11-22 | 2022-12-06 | Pure Storage, Inc. | Storage system snapshot retention based on encrypted data |
US11657155B2 (en) | 2019-11-22 | 2023-05-23 | Pure Storage, Inc | Snapshot delta metric based determination of a possible ransomware attack against data maintained by a storage system |
US11755751B2 (en) | 2019-11-22 | 2023-09-12 | Pure Storage, Inc. | Modify access restrictions in response to a possible attack against data stored by a storage system |
US11645162B2 (en) | 2019-11-22 | 2023-05-09 | Pure Storage, Inc. | Recovery point determination for data restoration in a storage system |
US11500788B2 (en) | 2019-11-22 | 2022-11-15 | Pure Storage, Inc. | Logical address based authorization of operations with respect to a storage system |
US11941116B2 (en) | 2019-11-22 | 2024-03-26 | Pure Storage, Inc. | Ransomware-based data protection parameter modification |
US11625481B2 (en) | 2019-11-22 | 2023-04-11 | Pure Storage, Inc. | Selective throttling of operations potentially related to a security threat to a storage system |
US11720692B2 (en) | 2019-11-22 | 2023-08-08 | Pure Storage, Inc. | Hardware token based management of recovery datasets for a storage system |
US11615185B2 (en) | 2019-11-22 | 2023-03-28 | Pure Storage, Inc. | Multi-layer security threat detection for a storage system |
US11720714B2 (en) | 2019-11-22 | 2023-08-08 | Pure Storage, Inc. | Inter-I/O relationship based detection of a security threat to a storage system |
US11675898B2 (en) | 2019-11-22 | 2023-06-13 | Pure Storage, Inc. | Recovery dataset management for security threat monitoring |
US11341236B2 (en) | 2019-11-22 | 2022-05-24 | Pure Storage, Inc. | Traffic-based detection of a security threat to a storage system |
US11651075B2 (en) | 2019-11-22 | 2023-05-16 | Pure Storage, Inc. | Extensible attack monitoring by a storage system |
US11687418B2 (en) | 2019-11-22 | 2023-06-27 | Pure Storage, Inc. | Automatic generation of recovery plans specific to individual storage elements |
US11204985B2 (en) * | 2020-03-31 | 2021-12-21 | Irdeto Canada Corporation | Systems, methods, and storage media for creating secured computer code having entangled transformations |
US11902424B2 (en) * | 2020-11-20 | 2024-02-13 | International Business Machines Corporation | Secure re-encryption of homomorphically encrypted data |
US20220255726A1 (en) * | 2021-01-29 | 2022-08-11 | Robert Bosch Gmbh | System and method for improving the efficiency of advanced encryption standard in multi-party computation |
US11722292B2 (en) | 2021-01-29 | 2023-08-08 | Robert Bosch Gmbh | System and method for improving the efficiency of advanced encryption standard in multi-party computation with precomputed data |
IT202100012488A1 (en) * | 2021-05-14 | 2022-11-14 | Torino Politecnico | Method of configuring neural networks and method of processing binary files |
EP4339835A1 (en) | 2022-09-16 | 2024-03-20 | Irdeto B.V. | Machine learning model protection |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5892899A (en) * | 1996-06-13 | 1999-04-06 | Intel Corporation | Tamper resistant methods and apparatus |
US6192475B1 (en) * | 1997-03-31 | 2001-02-20 | David R. Wallace | System and method for cloaking software |
WO1999001815A1 (en) | 1997-06-09 | 1999-01-14 | Intertrust, Incorporated | Obfuscation techniques for enhancing software security |
FR2776445A1 (en) * | 1998-03-17 | 1999-09-24 | Schlumberger Ind Sa | Cryptographic algorithm security technique |
JP3600454B2 (en) * | 1998-08-20 | 2004-12-15 | 株式会社東芝 | Encryption / decryption device, encryption / decryption method, and program storage medium therefor |
EP1142191B1 (en) * | 1998-12-30 | 2006-08-09 | Nokia Corporation | Method and device for cryptographically processing data |
CA2447451C (en) * | 2000-05-12 | 2013-02-12 | Xtreamlok Pty. Ltd. | Information security method and system |
CA2327911A1 (en) | 2000-12-08 | 2002-06-08 | Cloakware Corporation | Obscuring functions in computer software |
CA2369304A1 (en) * | 2002-01-30 | 2003-07-30 | Cloakware Corporation | A protocol to hide cryptographic private keys |
FR2849232B1 (en) * | 2002-12-24 | 2005-02-25 | Trusted Logic | METHOD FOR SECURING COMPUTER SYSTEMS INCORPORATING A CODE INTERPRETATION MODULE |
US7631292B2 (en) * | 2003-11-05 | 2009-12-08 | Microsoft Corporation | Code individualism and execution protection |
US20050223361A1 (en) * | 2004-04-01 | 2005-10-06 | Belbute John L | Software testing based on changes in execution paths |
US8015211B2 (en) * | 2004-04-21 | 2011-09-06 | Architecture Technology Corporation | Secure peer-to-peer object storage system |
-
2000
- 2000-12-08 CA CA002327911A patent/CA2327911A1/en not_active Abandoned
-
2001
- 2001-12-10 EP EP01999868A patent/EP1350154A2/en not_active Withdrawn
- 2001-12-10 AU AU2002221414A patent/AU2002221414A1/en not_active Abandoned
- 2001-12-10 WO PCT/CA2001/001729 patent/WO2002046890A2/en not_active Application Discontinuation
- 2001-12-10 CA CA002431443A patent/CA2431443A1/en not_active Abandoned
- 2001-12-10 US US10/433,966 patent/US7397916B2/en not_active Expired - Fee Related
-
2004
- 2004-12-27 US US11/020,313 patent/US7809135B2/en not_active Expired - Fee Related
Also Published As
Publication number | Publication date |
---|---|
US7809135B2 (en) | 2010-10-05 |
US7397916B2 (en) | 2008-07-08 |
AU2002221414A1 (en) | 2002-06-18 |
CA2327911A1 (en) | 2002-06-08 |
CA2431443A1 (en) | 2002-06-13 |
US20040139340A1 (en) | 2004-07-15 |
US20060140401A1 (en) | 2006-06-29 |
EP1350154A2 (en) | 2003-10-08 |
WO2002046890A2 (en) | 2002-06-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2002046890A8 (en) | System and method for protecting computer software from a white box attack | |
AU7925100A (en) | A method and system for software updating | |
AU2001227597A1 (en) | Protection domains for a computer operating system | |
AU2002349217A1 (en) | Secure method and system for computer protection | |
WO2003046700A8 (en) | Method and system for protecting data from unauthorized disclosure | |
AU2452001A (en) | A method and system for modeling data | |
AU3111800A (en) | A computer implemented method | |
AU6098700A (en) | System and method for generating fictitious content for a computer | |
AU7756000A (en) | Method and system for operating a content management system | |
AU5598600A (en) | Method and systems for protecting data using digital signature and watermark | |
AU7101800A (en) | System and method for protecting a cranking subsystem | |
AU2002215739A1 (en) | Method and system for creating a virtual team environment | |
WO2002007460A8 (en) | A system and method for context association | |
AU2002212592A1 (en) | A method of and a system for distributing electronic content | |
AU9208298A (en) | Method for protecting content using watermarking | |
AU7130200A (en) | Sound system and method for creating a sound event based on a modeled sound field | |
AU2001270969A1 (en) | A method and system for sharing knowledge | |
AU2001239781A1 (en) | Method and system for facilitating a sale | |
AU4347001A (en) | Method and system for modeling a legacy computer system | |
GB0109620D0 (en) | A method and system for distributing software features to a computer | |
WO2002091254A8 (en) | A company board data processing system and method | |
AU2002220761A1 (en) | A method and system for distributing electronic content | |
AU5772000A (en) | System and method for regulating access and for creating a secure and convenientcomputing environment | |
AU6127999A (en) | Method for security partitioning of a computer system | |
EP0962850A3 (en) | A method for protecting embedded system software and embedded system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A2 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A2 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
D17 | Declaration under article 17(2)a | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2431443 Country of ref document: CA |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2001999868 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 2001999868 Country of ref document: EP |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10433966 Country of ref document: US |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2001999868 Country of ref document: EP |
|
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |