White-box attack context cryptovirology

被引:1
|
作者
Josse, Sebastien [1 ]
机构
[1] Silicomp AQL, 1 Rue Chataigneraie,Cs 51766, F-35517 Cesson Sevigne, France
关键词
D O I
10.1007/s11416-008-0097-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the use of cryptographic mechanisms that are suited to the white box attack context (the attacker is supposed to have full control of the target program's execution environment) and as we will demonstrate, to a viral context. Use of symmetric and asymmetric cryptography by viruses has been popularized by polymorphic viruses and cryptoviruses. The latter are specialized in extorsion. New cryptographic mechanisms, corresponding to a particular implementation of traditional (black box) cryptography have been recently designed to ensure the deep protection of legitimate applications. These mechanisms can be misappropriated and used for the purpose of doing extorsion. We evaluate these new cryptographic primitives and discuss their (mis)use in a viral context.
引用
收藏
页码:321 / 334
页数:14
相关论文
共 50 条
  • [1] Accelerate Black-Box Attack with White-Box Prior Knowledge
    Cai, Jinghui
    Wang, Boyang
    Wang, Xiangfeng
    Jin, Bo
    [J]. INTELLIGENCE SCIENCE AND BIG DATA ENGINEERING: BIG DATA AND MACHINE LEARNING, PT II, 2019, 11936 : 394 - 405
  • [2] Persistent Fault Injection Attack From White-box to Black-box
    Mesbah, Abdelhak
    Mezghiche, Mohamed
    Lanet, Jean-louis
    [J]. 2017 5TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING - BOUMERDES (ICEE-B), 2017,
  • [3] Measuring Performances of a White-Box Approach in the IoT Context
    Albricci, Daniele Giacomo Vittorio
    Ceria, Michela
    Cioschi, Federico
    Fornari, Nicolo
    Shakiba, Arvin
    Visconti, Andrea
    [J]. SYMMETRY-BASEL, 2019, 11 (08):
  • [4] Another Look on Bucketing Attack to Defeat White-Box Implementations
    Zeyad, Mohamed
    Maghrebi, Houssem
    Alessio, Davide
    Batteux, Boris
    [J]. CONSTRUCTIVE SIDE-CHANNEL ANALYSIS AND SECURE DESIGN (COSADE 2019), 2019, 11421 : 99 - 117
  • [5] A DFA Attack on White-Box Implementations of AES with External Encodings
    Amadori, Alessandro
    Michiels, Wil
    Roelse, Peter
    [J]. SELECTED AREAS IN CRYPTOGRAPHY - SAC 2019, 2020, 11959 : 591 - 617
  • [6] White-box benchmarking
    Hernández, E
    Hey, T
    [J]. EURO-PAR '98 PARALLEL PROCESSING, 1998, 1470 : 220 - 223
  • [7] White-box testing
    Cole, O
    [J]. DR DOBBS JOURNAL, 2000, 25 (03): : 23 - +
  • [8] Investigating Top-k White-Box and Transferable Black-box Attack
    Zhang, Chaoning
    Benz, Philipp
    Karjauv, Adil
    Cho, Jae Won
    Zhang, Kang
    Kweon, In So
    [J]. 2022 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2022), 2022, : 15064 - 15073
  • [9] Automating the BGE Attack on White-Box Implementations of AES with External Encodings
    Amadori, Alessandro
    Michiels, Wil
    Roelse, Peter
    [J]. 2020 IEEE 10TH INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE-BERLIN), 2020,
  • [10] A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts
    Shi, Yang
    Liu, Qin
    Zhao, Qinpei
    [J]. JOURNAL OF APPLIED MATHEMATICS, 2013,