CN108090349A - A kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system and method - Google Patents

A kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system and method Download PDF

Info

Publication number
CN108090349A
CN108090349A CN201711379083.XA CN201711379083A CN108090349A CN 108090349 A CN108090349 A CN 108090349A CN 201711379083 A CN201711379083 A CN 201711379083A CN 108090349 A CN108090349 A CN 108090349A
Authority
CN
China
Prior art keywords
whitepack
instruction
application program
code
look
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711379083.XA
Other languages
Chinese (zh)
Inventor
崔竞松
涂航
宋智淇
文皓冬
李莉
宋奕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Jia Hong Technology Co Ltd
Original Assignee
Wuhan Jia Hong Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Jia Hong Technology Co Ltd filed Critical Wuhan Jia Hong Technology Co Ltd
Priority to CN201711379083.XA priority Critical patent/CN108090349A/en
Publication of CN108090349A publication Critical patent/CN108090349A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/54Link editing before load time

Abstract

The present invention relates to a kind of application program whitepackizations based on whitepack instruction and expander graphs spirit model to protect system and method.Expander graphs spirit model of the system based on seven tuples, it is main to include following several parts:Whitepack computing engines, whitepack Code Generator, whitepack search storehouse.Code to be protected is transformed into corresponding whitepack instruction stream, storehouse generation whitepack look-up table is searched based on whitepack by the whitepack computing engines of the system by whitepack Code Generator.Whitepack instruction stream after compiling generation under the operation of computing engines, calls the whitepack look-up table by random dijection processing to carry out the operation of data.It is identical with the function of original code on whitepack code function after generation, but effectively improve the ability of its anti-white-box attack under whitepack environment.The present invention can be realized to being protected in application program with the whitepackization of the relevant key code of computing, so that application program can be effective against a series of attacks under whitepack environment.

Description

A kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system System and method
Technical field
The present invention relates to the code protections of the application program of information security field.It is for the application program under whitepack environment Code protection.Prevent attacker from whitepack environment, cracking the key code of application program, so as to steal valuable algorithm Etc. information, be specifically related to a kind of based on whitepack instruction set and the application program whitepackization of expander graphs spirit model protection system and side Method.
Background technology
The concept of white-box attack was proposed earliest by Chow et al. in 2002.White-box attack is different from traditional black box and attacks It hits, under whitepack environment, white-box attack assumes that attacker possesses completely device end (i.e. the running environment of application program) Control ability can be observed and change all internal datas when application program is run, and attacker has stronger means capability. Attacker can to binary system tracking that program is run, read data in memory, the intermediate result that procedures of observation performs, arbitrary Static analysis and change result etc. of oneself calculation.Therefore the application program salvo of traditional anti-black box attack is not enough to Tackle white-box attack.At present, the white-box techniques of academia are mostly used for the protection to cryptographic algorithm, and field is narrow.And Commercial field, the code protection method of some whitepacks, there are mainly four types of:First, code controls levelling exhibitionization;Refer to second is that increasing Make complexity;Third, control stream is forged;Fourth, use virtual machine technique.Although these methods have used the multiple hand in engineering Section, but attacker still can break through these protection techniques under certain acceptable cost.It is and of the invention by whitepack skill The whitepackization to application program that art is applied to information security field is protected, and uses the whitepack code protection skill based on look-up table Art can not only be effective against attacker in engineering, and can be from its security of academicly theoretical proof, this is the present invention white A big innovative point on box code protection.
1936, Alan Turing proposed Turing machine computation model, and basic model is the single tape figure spirit of a deterministic type Machine, it, can be under finite state controller in belt there are one read/write head by the use of the belt of an endless as infinite memory It upper reading and writing and moves left and right, each step of operation is all to determine uniquely.Based on the clever model of figure, there are many expanded applications.This Invention is exactly a kind of extension based on the clever model of figure.
The content of the invention
The technical issues of present invention is mainly solved present in the prior art;It provides a kind of by the way that carrying whitepack is called to look into The whitepack instruction set of table is looked for, the whitepackization protection to the relevant key code of in application program and computing is realized, so that should The white-box attack under whitepack environment can be effective against with program.
The above-mentioned technical problem of the present invention is mainly what is be addressed by following technical proposals:
A kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system, which is characterized in that is It is under unified central planning to be equipped with:
Whitepack computing engines:Be configured to transfer in whitepack Code Generator code with it is white in instruction module Box instructs, and completes what is instructed to needing to carry out the crucial non-whitepack arithmetic operation of the setting of whitepack protection in destination application Mapping is replaced, while the search rule in being instructed according to whitepack searches the look-up table formulated, and the output of look-up table is mutually meets the tendency of Calculate the output result of operation;
Whitepack Code Generator:It is configurable to generate the whitepack code of application program and whitepack instruction set, and energy The call instruction that whitepack computing engines instruct corresponding whitepack is enough received, non-whitepackization instruction is replaced, code to be protected is changed Into corresponding whitepack instruction stream.Storehouse is searched with the whitepack in system simultaneously and carries out cooperating, whitepack is searched storehouse and can be generated accordingly Look-up table, instrument calls corresponding whitepack look-up table under the operation of computing engines, enters data into whitepack look-up table The lookup of output result is carried out,.Whitepack Code Generator includes:Code and instruction module store data module, are random double Penetrate module;
Whitepack searches storehouse:The database that the system of being configured as carries is the resource for generating whitepack look-up table, can will be permitted The intermediate result of multiple instruction flow operation generation is stored in the net structure of substantial amounts of look-up table composition, and can receive whitepack The calling of Code Generator provides the data searched needed for whitepack Code Generator.
The invention carries out following improvement:The system is in the compilation phase, under the operation of whitepack computing engines, Using whitepack Code Generator, code to be protected is transformed into corresponding whitepack instruction stream, while is equipped with corresponding process The whitepack look-up table of random dijection treated whitepack searches storehouse generation.After the completion of compilation phase, answering after generation whitepack protection With the whitepack instruction stream of program, whitepack instruction stream is called under the operation of computing engines at the random dijection of process of outfit The whitepack look-up table of reason carries out the operation of data, identical with the function of original code on the whitepack code function after generation, but Anti- white-box attack ability under whitepack environment is improved.This method is:It is called by the whitepack computing engines in system white Box instructs and the whitepack look-up table by random dijection processing, and code to be protected is transformed into corresponding whitepack instruction stream, is realized The whitepackization of the relevant key code of in application program and computing is protected, so that application program can be effective against whitepack A series of attacks under environment.
System, whitepack are protected in a kind of above-mentioned application program whitepackization based on whitepack instruction and expander graphs spirit model Code Generator is configured with:
Code and instruction module:Being configurable to generate needs the whitepack instruction stream of application program to be protected;Store data mould Block:The whitepack code and whitepack instruction and storage for being configured as the need application program to be protected of storage generation to be adjusted Source data and the result data of storage;
Random dijection module:It is configured as needing to carry out in destination application the non-whitepack of the setting of whitepack protection After arithmetic operation instruction carries out mapping replacement, random dijection protection is carried out..
The flow chart of intermodule is as shown in Figure 2.
In a kind of above-mentioned application program whitepack protection system based on whitepack instruction and expander graphs spirit model, at random The meaning of dijection is:Random dijection F refers to a m bit to the stochastic transformation of n-bit, F-1It is its inverse transformation.Its effect is By the input of a look-up table and export into row stochastic upset, random dijection F and its inverse transformation F-1Do not go out on same table It is existing, but intersperse among in the complicated network structure of substantial amounts, due to network structure it is complicated alternately and substantial amounts, So that the algorithm in table corresponding to data cannot be derived from the input and output of a table, so as to protect the number in look-up table According to.
A kind of application program whitepack guard method instructed based on whitepack with expander graphs spirit model, which is characterized in that logical The whitepack computing engines crossed in system call whitepack instruction and the whitepack look-up table by random dijection processing, by code to be protected It is transformed into corresponding whitepack instruction stream, realizes the whitepackization protection to the relevant key code of in application program and computing, with Allow the application to be effective against a series of attacks under whitepack environment.The exemplary plot of method is as shown in Figure 1.
A kind of referred to above-mentioned based on whitepack instruction and the application program whitepack guard method of expander graphs spirit model, whitepack It makes as the instruction of 4 tuples:
WBCInstruction=(src1, src2, dst, table_rule).
A kind of drawn above-mentioned based on whitepack instruction and the application program whitepack guard method of expander graphs spirit model, calculating Holding up the process that the instruction of the whitepack in whitepack instruction set is called to be protected is:Corresponding data are found first in whitepack instruction to exist The position of database, i.e. src1, the position of src2 meanings and the storage location of result data, then utilize search rule Table_rule carries out table lookup operation into look-up table and finds corresponding data, obtain whitepackization processing as a result, and value is returned Return to the storage location dst of corresponding result data, in whole process, the flowing of data all carries out within system, not with Its exterior has any data interaction..
In a kind of above-mentioned application program whitepack guard method based on whitepack instruction set and expander graphs spirit model, the party Method is based on expander graphs spirit model, is one 7 tuple WBX_S=(S, Γ, ∑, σ, q on model0, qf, T), wherein, S is one A finite state collection;Γ is a limited tape character collection;Represent input character set;σ is the shape in system State is changed the mechanism, q0∈ S are the beginning states of system;qf∈ S are the reception states of system, that is, the state after changing;T is to be Look-up table in system, remains unchanged in systems.
In a kind of above-mentioned application program whitepack guard method based on whitepack instruction set and expander graphs spirit model, σ is State transition mechanism process in system is:, corresponding whitepack is called to instruct, is completed to needing to carry out whitepack guarantor in application program The mapping of the non-whitepack instruction of shield is replaced, σ (q, x)=(q ', W, { src, dst, Flag }), wherein x,This turn When exchange the letters number σ represents that system is in state q, the non-whitepack instruction for if desired carrying out whitepack protection is instruction x, at this time state transformation For q ', then instruction is become into whitepack instruction w, at this point, the transition state of computing engines is represented by { src, dst, Flag }, wherein Src represents the original state of computing engines, i.e., the initial position that computing engines are directed toward, and dst represents the reception state of computing engines, Position after the variation that i.e. computing engines are directed toward, Flag represent that instruction does not convert for 0, represent to convert for 1.
Therefore, the invention has the advantages that:1. whitepack protection technique and random dijection technology based on look-up table With preferable safety examination and proof can be obtained in theory;2. the data, code in system have closure, outside The data of portion's insertion cannot disturb the data of internal system;3. the complicated network structure of look-up table, similar to nerve net Network structure, the complexity of conversed analysis is high, and anti-attack ability is excellent.
Description of the drawings
Attached drawing 1 is the method exemplary plot of the present invention.
Attached drawing 2 is the flow chart of the embodiment of the present invention.
Specific embodiment
Below with reference to the embodiments and with reference to the accompanying drawing the technical solutions of the present invention will be further described.
Embodiment:
First, the hardware configuration of the present invention is introduced first, and system of the present invention is broadly divided into three parts:Whitepack meter It calculates engine, whitepack Code Generator, whitepack and searches Table storehouse, concrete function is:
Whitepack computing engines:Be configured to transfer in whitepack Code Generator code with it is white in instruction module Box instructs, and completes what is instructed to needing to carry out the crucial non-whitepack arithmetic operation of the setting of whitepack protection in destination application Mapping is replaced, while the look-up table that the search rule lookup in being instructed according to whitepack is specified, and the output of look-up table is corresponding computing The output result of operation;
Whitepack Code Generator:The whitepack code and whitepack for being configurable to generate application program instruct, and can The call instruction that whitepack computing engines instruct corresponding whitepack is received, non-whitepackization instruction is replaced, code to be protected is transformed into Corresponding whitepack instruction stream.Storehouse is searched with the whitepack in system simultaneously and carries out cooperating, whitepack is searched storehouse and can be generated accordingly Look-up table, instrument call corresponding whitepack look-up table under the operation of computing engines, enter data into whitepack look-up table into The lookup of row output result,.Whitepack Code Generator includes:Code and instruction module, storage data module, random dijection Module;
Whitepack searches storehouse:The database that the system of being configured as carries is the resource for generating whitepack look-up table, can will be permitted The intermediate result of multiple instruction flow operation generation is stored in the net structure of substantial amounts of look-up table composition, and can receive whitepack The calling of Code Generator provides the data searched needed for whitepack Code Generator.
Wherein, whitepack Code Generator is configured with:
Code and instruction module:Being configurable to generate needs the whitepack instruction stream of application program to be protected;Store data mould Block:The whitepack code and whitepack instruction and storage for being configured as the need application program to be protected of storage generation to be adjusted Source data and the result data of storage;
Random dijection module:It is configured as needing to carry out in destination application the non-whitepack of the setting of whitepack protection After arithmetic operation instruction carries out mapping replacement, random dijection protection is carried out.
2nd, specific guard method of the invention is described below:
Step 1:User use the system in application program some arithmetic operations carry out whitepackization protection when, with The system on householder's machine is installed, by the whitepack computing engines in system, calls code and finger in whitepack Code Generator Mould whitepack instruction in the block is made, and passes through computing engines and searches corresponding look-up table;
Step 2:Whitepack instruction is 4 tuple commands: WBCInstruction=(src1, src2, dst, table_ rule).Instruction module in whitepack Code Generator finds corresponding data in storage data by random dijection module Mould position in the block, the i.e. position of src1, src2 meaning and the storage location of result data.
Step 3::Table lookup operation is carried out using search rule table_rule find corresponding data by searching for Table storehouse, Obtain that whitepackization is handled as a result, and value is returned to the position dst in corresponding storage data module.
Step 4:Above step complete in destination application, it is necessary to carry out the crucial non-whitepack computing of whitepack protection The mapping of operational order is replaced, and the key operation operation after replacement in application program can effectively be protected under whitepack environment Shield resists a series of attacks under whitepack environment.
In the present invention, system is based on a 7 tuple model developments, which is defined as:WBX_S=(S, Г, ∑, σ, q0, qf, T) and specific explanations are:
1st, S is a finite state collection;
2nd, Γ is a limited tape character collection;
3、Represent input character set;
4th, σ is the state transition mechanism in system, mainly completes conversion by whitepack computing engines and the cooperation of whitepack instruction set Function.Its realize function be:System starts whitepack computing engines, and corresponding whitepack is called to instruct, is completed to application program The middle mapping for needing to carry out the non-whitepack instruction of whitepack protection is replaced.σ (q, x)=(q ', W, { src, dst, Flag }).Wherein x,When this transfer function σ represents that system is in state q, the non-whitepack instruction for if desired carrying out whitepack protection is instruction X, at this time state transformation be q ', then by instruction become whitepack instruction W, at this point, the transition state of computing engines by src, dst, Flag } it represents, wherein src represents the original state (initial position that engine is directed toward) of computing engines, and dst represents computing engines Reception state (position after the variation that engine is directed toward), Flag represent that instruction does not convert for 0, represent to convert for 1.
5、q0∈ S are the beginning states of system;
6、qf∈ S are the reception states of system, that is, the state after changing.
7th, T is the look-up table in system, is remained unchanged in systems.
Specific embodiment described herein is only to spirit explanation for example of the invention.Technology belonging to the present invention is led The technical staff in domain can do various modifications or additions to described specific embodiment or replace in a similar way Generation, but without departing from spirit of the invention or beyond the scope of the appended claims.

Claims (9)

1. a kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system, which is characterized in that system It is configured with:
Whitepack computing engines:It is configured to transfer code in whitepack Code Generator with the whitepack in instruction module to refer to The mapping to needing to carry out the crucial non-whitepack arithmetic operation of the setting of whitepack protection to instruct in destination application is completed in order It replaces, while the look-up table that the search rule lookup in being instructed according to whitepack is specified, the output of look-up table is corresponding arithmetic operation Output result;
Whitepack Code Generator:The whitepack code and whitepack for being configurable to generate application program instruct, and can receive The call instruction that whitepack computing engines instruct corresponding whitepack replaces non-whitepackization instruction, code to be protected is transformed into accordingly Whitepack instruction stream;Storehouse is searched with the whitepack in system simultaneously and carries out cooperating, whitepack, which searches storehouse, can generate corresponding lookup Table, instrument call corresponding whitepack look-up table under the operation of computing engines, enter data into whitepack look-up table carry out it is defeated Go out the lookup of result,;Whitepack Code Generator includes:Code and instruction module, storage data module, random double injection mould Block;
Whitepack searches storehouse:The database that the system of being configured as carries is the resource for generating whitepack look-up table, can be by many fingers The intermediate result of order stream operation generation is stored in the net structure of substantial amounts of look-up table composition, and can receive whitepack code The calling of Core Generator provides the data searched needed for whitepack Code Generator.
2. a kind of application program whitepackization based on whitepack instruction and expander graphs spirit model according to claim 1 protects system System, which is characterized in that the work period of computing engines is:Computing engines complete mapping and replace and search corresponding look-up table Afterwards, it is considered as a work period of computing engines.
3. a kind of application program whitepackization based on whitepack instruction and expander graphs spirit model according to claim 1 protects system System, which is characterized in that whitepack Code Generator is configured with:
Code and instruction module:Being configurable to generate needs the whitepack instruction stream of application program to be protected;
Store data module:The whitepack code and whitepack for being configured as the need application program to be protected of storage generation instruct, And store the result data of the source data to be called and storage;
Random dijection module:It is configured as needing to carry out in destination application the non-whitepack computing of the setting of whitepack protection After operational order carries out mapping replacement, random dijection protection is carried out.
4. a kind of application program whitepackization based on whitepack instruction and expander graphs spirit model according to claim 3 protects system The random dijection module of system, it is characterised in that:
Random dijection F refers to a m bit to the stochastic transformation of n-bit, F-1It is its inverse transformation;It is by a lookup that it, which is acted on, The input of table is with exporting into row stochastic upset, random dijection F and its inverse transformation F-1Do not occur on same table, but spread In the complicated network structure of substantial amounts, due to network structure it is complicated alternately and substantial amounts so that from one The algorithm in table corresponding to data cannot be derived in the input and output of table, so as to protect the data in look-up table.
It is 5. a kind of based on whitepack instruction and the application program whitepack guard method of expander graphs spirit model, which is characterized in that pass through Whitepack computing engines in system call whitepack instruction and the whitepack look-up table by random dijection processing, and code to be protected is turned Become corresponding whitepack instruction stream, realize the whitepackization protection to the relevant key code of in application program and computing, so that Obtain a series of attacks that application program can be effective against under whitepack environment.
6. a kind of application program whitepack guard method instructed based on whitepack with expander graphs spirit model according to claim 5, It is characterized in that, instruction of the whitepack instruction for 4 tuples:WBCInstruction=(src1, src2, dst, table_rule).
7. a kind of application program whitepackization protection side based on whitepack instruction and expander graphs spirit model according to claim 5 Method, which is characterized in that computing engines call the process protected of whitepack instruction to be:It is found first in whitepack instruction corresponding Data are in the position of database, i.e. src1, the position of src2 meanings and the storage location dst of result data, then using looking into Regular table-rule is looked for carry out table lookup operation into look-up table and finds corresponding data, obtain whitepackization processing as a result, simultaneously The storage location dst back to corresponding result data will be worth, in whole process, the flowings of data all within system into Row, does not there is any data interaction with its exterior.
8. a kind of application program whitepackization protection side based on whitepack instruction and expander graphs spirit model according to claim 6 Method, which is characterized in that this method be based on expander graphs spirit model, on model be a 7 tuple WBX_S=(S, Γ, ∑, σ, q0, qf, T), wherein, S is a finite state collection;Γ is a limited tape character collection;Represent input word Symbol collection;σ be system in state transition mechanism, q0∈ S are the beginning states of system;qf∈ S are the reception states of system, i.e., State after variation;T is the look-up table in system, is remained unchanged in systems.
It is 9. according to claim 8 a kind of based on whitepack instruction set and the protection of the application program whitepackization of expander graphs spirit model Method, which is characterized in that σ is that the state transition mechanism process in system is:Corresponding whitepack is called to instruct, is completed to applying journey The mapping for carrying out the non-whitepack instruction of whitepack protection is needed to replace in sequence, σ (q, x)=(q ', W, { src, dst, Flag }), wherein X,When this transfer function σ represents that system is in state q, if desired carrying out the non-whitepack instruction of whitepack protection is Instruct x, at this time state transformation be q ', then by instruction become whitepack instruction W, at this point, the transition state of computing engines by src, Dst, Flag } it represents, wherein src represents the original state of computing engines, i.e., the initial position that computing engines are directed toward, and dst is represented Position after the variation that the reception state of computing engines, i.e. computing engines are directed toward, Flag represent that instruction does not convert for 0, are 1 table It is shown as converting.
CN201711379083.XA 2017-12-19 2017-12-19 A kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system and method Pending CN108090349A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711379083.XA CN108090349A (en) 2017-12-19 2017-12-19 A kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711379083.XA CN108090349A (en) 2017-12-19 2017-12-19 A kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system and method

Publications (1)

Publication Number Publication Date
CN108090349A true CN108090349A (en) 2018-05-29

Family

ID=62177482

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711379083.XA Pending CN108090349A (en) 2017-12-19 2017-12-19 A kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system and method

Country Status (1)

Country Link
CN (1) CN108090349A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101491001A (en) * 2006-07-12 2009-07-22 皇家飞利浦电子股份有限公司 Tamper resistance of a digital data processing unit
US20130010963A1 (en) * 2011-07-07 2013-01-10 Farrugia Augustin J Multiplicative splits to protect cipher keys
CN105099666A (en) * 2015-06-26 2015-11-25 中国科学院信息工程研究所 White-box cryptography system for confusing wheel boundary and method
CN105681025A (en) * 2016-01-29 2016-06-15 中国科学院信息工程研究所 Security white box realizing method and device for national cipher standard algorithm SM4
CN106059752A (en) * 2016-07-04 2016-10-26 中国科学院信息工程研究所 White-box cryptography encryption-decryption method based on expansion ciphertext
US20170033921A1 (en) * 2015-07-30 2017-02-02 Nxp, B.V. Encoding Values by Pseudo-Random Mask
CN107005404A (en) * 2014-11-10 2017-08-01 德国捷德有限公司 The whitepack of reinforcing realizes 1

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101491001A (en) * 2006-07-12 2009-07-22 皇家飞利浦电子股份有限公司 Tamper resistance of a digital data processing unit
US20130010963A1 (en) * 2011-07-07 2013-01-10 Farrugia Augustin J Multiplicative splits to protect cipher keys
CN107005404A (en) * 2014-11-10 2017-08-01 德国捷德有限公司 The whitepack of reinforcing realizes 1
CN105099666A (en) * 2015-06-26 2015-11-25 中国科学院信息工程研究所 White-box cryptography system for confusing wheel boundary and method
US20170033921A1 (en) * 2015-07-30 2017-02-02 Nxp, B.V. Encoding Values by Pseudo-Random Mask
CN105681025A (en) * 2016-01-29 2016-06-15 中国科学院信息工程研究所 Security white box realizing method and device for national cipher standard algorithm SM4
CN106059752A (en) * 2016-07-04 2016-10-26 中国科学院信息工程研究所 White-box cryptography encryption-decryption method based on expansion ciphertext

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
吴蒙 等: ""白盒AES加密在软件保护中的应用"", 《科技信息化》 *

Similar Documents

Publication Publication Date Title
Demertzis et al. Dynamic searchable encryption with small client storage
Wang et al. Searchable encryption over feature-rich data
Degano et al. Axiomatizing net computations and processes
CN103279713B (en) A kind of social network diagram data publication method for secret protection of optimization
US9576244B2 (en) Methods and systems of four-valued simulation
KR100960120B1 (en) Signature String Storing Memory Structure and the Storing Method for the Same, Signature String Pattern Matching Method
Zhuang et al. A pilot study of query-free adversarial attack against stable diffusion
Kim et al. A privacy-preserving kNN classification algorithm using Yao's garbled circuit on cloud computing
CN106610995A (en) Ciphertext index creating method, device and system
Whitley Mk landscapes, NK landscapes, MAX-kSAT: A proof that the only challenging problems are deceptive
Fan et al. Towards efficient authenticated subgraph query service in outsourced graph databases
CN104123503B (en) CNF formula data protection method in SAT problem solving outsourcing process
Parekh et al. Learning DFA from simple examples
CN105933120A (en) Spark platform-based password hash value recovery method and device
CN111475838A (en) Graph data anonymizing method, device and storage medium based on deep neural network
Li Research of key technologies on encrypting vector spatial data in oracle spatial
Guo et al. LuxGeo: Efficient and Security-Enhanced Geometric Range Queries
CN105843859B (en) The method, apparatus and equipment of data processing
CN108090349A (en) A kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system and method
Lueker A transformation for adding range restriction capability to dynamic data structures for decomposable searching problems
Guan et al. Achieving privacy-preserving discrete frchet distance range queries
Zhang et al. Sorel: Efficient and secure ore-based range query over outsourced data
Zhang et al. Secure cipher index over encrypted character data in database
KR101049072B1 (en) The method of mapping using identification data
CN109829056A (en) Predicate explains the fact that template-driven Abductive reasoning method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180529