Guillaume VINET 19th May 2019
1
Guillaume VINET 19th May 2019 1 becoming more mature the art - - PowerPoint PPT Presentation
Guillaume VINET 19th May 2019 1 becoming more mature the art adequatly protected. and heavy processing issues White-Box Cryptography (WBC) security analyses are Tracing the binary execution is now part of the state of Tracing can
Guillaume VINET 19th May 2019
1
2
3
Native binary file (assembly code) NO SOURCE FILES! It is not possible to add a printf or comment a line to see what happens
4
5
6
Illustration: http:/ /tigress.cs.arizona.edu/transformPage/docs/flatten/index.html Control flow flattening
7
8
9
Input Output Observe Modify
10
11
Unboxing the White-Box - Practical attacks against Obfuscated Ciphers Eloi Sanfelix, Cristofaro Mune and Job de Haas Black Hat 2015 Differential Computation Analysis Hiding your White Box Designs is Not Enough Joppe W. Bos, Charles Hubain, Wil Michiels and Philippe Teuwen CHES 2016
12
13
14
15
https:/ /github.com/SideChannelMarvels
16
instruction Reading Writing
Illustration: https:/ /www.sstic.org/media/SSTIC2016/SSTIC-actes/design_de_cryptographie_white-box_et_a_la_fin_c_es/SSTIC2016-Slides- design_de_cryptographie_white-box_et_a_la_fin_c_est_kerckhoffs_qui_gagne-hubain_teuwen_1.pdf 17
18
19
Illustration https:/ /www.ledger.com/2019/02/26/introducing-rainbow-donjons-side-channel-analysis-simulation-tool/
20
21
Source https:/ /github.com/Ledger-Donjon/rainbow/blob/master/examples/ledger_ctf2/ripped.py
Call to external libraries must be implemented
22
23
24
25
26
27
28
29
Input:
Output:
30
Input:
Output:
31
32
33
34
35
best candidates from d0
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
With trig&act, we can skip the point multiplication (very big). Without it, we would have the same trace size as with Tracer Valgrind.
69
70
71
72
73
74
75
78
best candidates from d0.
79
80
81
82
word0 recovery
83
word0 recovery
word1 recovery
84
word0 recovery
word1 recovery
85
86
87
88
89
90
91