Netinfo Security ›› 2023, Vol. 23 ›› Issue (6): 66-73.doi: 10.3969/j.issn.1671-1122.2023.06.007
Previous Articles Next Articles
LUO Yinuo1, YAO Si1, CHEN Jie1,2(), DONG Xiaoli3
Received:
2023-02-09
Online:
2023-06-10
Published:
2023-06-20
CLC Number:
LUO Yinuo, YAO Si, CHEN Jie, DONG Xiaoli. Software Tamper Resistance Scheme Based on White-Box CLEFIA Implementation[J]. Netinfo Security, 2023, 23(6): 66-73.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2023.06.007
[1] | CHOW S, EISEN P, JOHNSON H, et al. White-Box Cryptography and an AES Implementation[C]// SAC. Proceedings of International Workshop on Selected Areas in Cryptography. Berlin:Springer, 2002: 250-270. |
[2] | WANG Chaokun, FU Junning, WANG Jianmin, et al. Survey of Software Tamper Proofing Technique[J]. Journal of Computer Research and Development, 2011, 48(6): 923-933. |
王朝坤, 付军宁, 王建民, 等. 软件防篡改技术综述[J]. 计算机研究与发展, 2011, 48(6): 923-933. | |
[3] | WANG Ping, KANG S K, KIM K. Tamper Resistant Software Through Dynamic Integrity Checking[EB/OL]. (2005-01-28)[2023-01-30]. https://www.researchgate.net/publication/266246195. |
[4] | COLLBERG C, THOMBORSON C, LOW D. A Taxonomy of Obfuscating Transformations[R]. New Zealand: Department of Computer Science, University of Auckland, TR148, 1997. |
[5] | SUN Zongyao. Software Tamper-Proofing Technology Based on Hash Function[D]. Changchun: Jilin University, 2009. |
孙宗姚. 基于Hash函数的软件防篡改技术[D]. 长春: 吉林大学, 2009. | |
[6] | MICHIELS W, GORISSEN P. Mechanism for Software Tamper Resistance: An Application of White-Box Cryptography[C]// SIGSAC. Proceedings of ACM Workshop on Digital Rights Management. Berlin:Springer, 2007: 82-89. |
[7] | LU Zhixu. The Research of Software Tamper Resistance Based on White-Box Cryptography[D]. Shanghai: Shanghai Jiao Tong University, 2012. |
卢致旭. 基于白盒加密算法的软件防篡改技术研究[D]. 上海: 上海交通大学, 2012. | |
[8] | XIAO Yaying, LAI Xuejia. A Secure Implementation of White-Box AES[C]// ICCSA. Proceedings of International Conference on Computer Science and its Applications. New York: IEEE, 2009: 1-6. |
[9] | LIN Tingting, ZHONG Yixin, LAI Xuejia, et al. Software Tamper Resistance Based on White-Box SMS4 Implementation[C]// ISCI. Proceedings of International Conference on Smart City and Informatization. Berlin:Springer, 2019: 486-495. |
[10] | XIAO Yaying, LAI Xuejia. White-Box Cryptography and White-Box Implementation of SMS4 Algorithm[C]// CACR. Proceedings of ChinaCrypt 2009. Beijing: Science and Technology of China Press, 2009: 24-34. |
肖雅莹, 来学嘉. 白盒密码及SMS4算法的白盒实现[C]// 中国密码学会.中国密码学会2009年会. 北京: 中国科学出版, 2009: 24-34. | |
[11] | DE MULDER Y, ROELSE P, PRENEEL B. Cryptanalysis of the Xiao-Lai White-Box AES Implementation[C]// SAC. Proceedings of International Workshop on Selected Areas in Cryptography:19th International Conference, SAC 2012. Berlin:Springer, 2013: 34-49. |
[12] |
LIN Tingting, LAI Xuejia. Efficient Attack to White-Box SMS4 Implementation[J]. Journal of Software, 2013, 24(9): 2238-2249.
doi: 10.3724/SP.J.1001.2013.04356 URL |
林婷婷, 来学嘉. 对白盒SMS4实现的一种有效攻击[J]. 软件学报, 2013, 24(9): 2238-2249. | |
[13] | YAO Si, CHEN Jie, GONG Yating, et al. A New Method for White-Box Implementation of CLEFIA Algorithm[J]. Journal of Xidian University, 2020, 47(5): 150-158. |
姚思, 陈杰, 宫雅婷, 等. CLEFIA算法的一种新型白盒实现[J]. 西安电子科技大学学报, 2020, 47(5): 150-158. | |
[14] | SHIRAI T, SHIBUTANI K, AKISHITA T, et al. The 128-bit Blockcipher CLEFIA (Extended Abstract)[C]// FSE. Proceedings of International Workshop on Fast Software Encryption. Berlin:Springer, 2007: 181-195. |
[15] | SU Shuai, DONG Hang, FU Ge, et al. A White-Box CLEFIA Implementation for Mobile Devices[C]// CSC. Proceedings of Communications Security Conference. New York: IEEE, 2014: 1-8. |
[16] | GONG Yating. Security Analysis and Improvement of White-Box CLEFIA Algorithm[D]. Xi'an: Xidian University, 2019. |
宫雅婷. 白盒CLEFIA算法的安全性分析与改进[D]. 西安: 西安电子科技大学, 2019. | |
[17] | MICHIELS W, GORISSEN P, HOLLMANN H D L. Cryptanalysis of a Generic Class of White-Box Implementations[C]// SAC. Proceedings of International Workshop on Selected Areas in Cryptography. Berlin:Springer, 2008: 414-428. |
[1] | HUANG Jie, HE Chengjun. Service Protection Scheme Based on Software Defined Perimeter [J]. Netinfo Security, 2023, 23(6): 1-10. |
[2] | SUN Chengcheng. Research on Countermeasures for Network Security Governance [J]. Netinfo Security, 2023, 23(6): 104-110. |
[3] | WANG Xiaodi, HUANG Cheng, LIU Jiayong. A Survey of Cyber Security Open-Source Intelligence Knowledge Graph [J]. Netinfo Security, 2023, 23(6): 11-21. |
[4] | XIE Ying, ZENG Zhu, HU Wei, DING Xuyang. A False Data Injection Attack Detecting and Compensating Method [J]. Netinfo Security, 2023, 23(6): 22-33. |
[5] | YANG Yuguang, LU Jiayu. A Dynamic and Hierarchical Quantum Secret Sharing Protocol Based on Starlike Cluster States [J]. Netinfo Security, 2023, 23(6): 34-42. |
[6] | LI Zhihua, WANG Zhihao. IoT Device Identification Method Based on LCNN and LSTM Hybrid Structure [J]. Netinfo Security, 2023, 23(6): 43-54. |
[7] | TANG Yu, ZHANG Chi. A Privacy Protection Scheme for Information-Centric Networking Based on Intel SGX [J]. Netinfo Security, 2023, 23(6): 55-65. |
[8] | JIANG Zenghui, ZENG Weijun, CHEN Pu, WU Shitao. Review of Adversarial Samples for Modulation Recognition [J]. Netinfo Security, 2023, 23(6): 74-90. |
[9] | WU Shangyuan, SHEN Guowei, GUO Chun, CHEN Yi. Threat Intelligence-Driven Dynamic Threat Hunting Method [J]. Netinfo Security, 2023, 23(6): 91-103. |
[10] | ZHAO Jun, REN Yi, LI Bao, TAN Yusong. Research on the Supply Chain Security Risk Assessment Methods for Mixed Source Operating System [J]. Netinfo Security, 2023, 23(5): 50-61. |
[11] | PEI Bei, ZHANG Shuihai, LYU Chunli. A Proactive Multi-Secret Sharing Scheme for Cloud Storage [J]. Netinfo Security, 2023, 23(5): 95-104. |
[12] | CHEN Zitong, JIA Peng, LIU Jiayong. Identification Method of Malicious Software Hidden Function Based on Siamese Architecture [J]. Netinfo Security, 2023, 23(5): 62-75. |
[13] | QIN Baodong, CHEN Congzheng, HE Junjie, ZHENG Dong. Multi-Keyword Searchable Encryption Scheme Based on Verifiable Secret Sharing [J]. Netinfo Security, 2023, 23(5): 32-40. |
[14] | MAO Hongjing, CHENG Yukun, HU Honggang. Multiple Persistent Faults Analysis with Unknown Faults [J]. Netinfo Security, 2023, 23(5): 41-49. |
[15] | ZHAO Xiaolin, WANG Qiyao, ZHAO Bin, XUE Jingfeng. Research on Anonymous Traffic Classification Method Based on Machine Learning [J]. Netinfo Security, 2023, 23(5): 1-10. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||