CN108090349A - A kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system and method - Google Patents
A kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system and method Download PDFInfo
- Publication number
- CN108090349A CN108090349A CN201711379083.XA CN201711379083A CN108090349A CN 108090349 A CN108090349 A CN 108090349A CN 201711379083 A CN201711379083 A CN 201711379083A CN 108090349 A CN108090349 A CN 108090349A
- Authority
- CN
- China
- Prior art keywords
- whitepack
- instruction
- application program
- code
- look
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformation of program code
- G06F8/54—Link editing before load time
Abstract
The present invention relates to a kind of application program whitepackizations based on whitepack instruction and expander graphs spirit model to protect system and method.Expander graphs spirit model of the system based on seven tuples, it is main to include following several parts:Whitepack computing engines, whitepack Code Generator, whitepack search storehouse.Code to be protected is transformed into corresponding whitepack instruction stream, storehouse generation whitepack look-up table is searched based on whitepack by the whitepack computing engines of the system by whitepack Code Generator.Whitepack instruction stream after compiling generation under the operation of computing engines, calls the whitepack look-up table by random dijection processing to carry out the operation of data.It is identical with the function of original code on whitepack code function after generation, but effectively improve the ability of its anti-white-box attack under whitepack environment.The present invention can be realized to being protected in application program with the whitepackization of the relevant key code of computing, so that application program can be effective against a series of attacks under whitepack environment.
Description
Technical field
The present invention relates to the code protections of the application program of information security field.It is for the application program under whitepack environment
Code protection.Prevent attacker from whitepack environment, cracking the key code of application program, so as to steal valuable algorithm
Etc. information, be specifically related to a kind of based on whitepack instruction set and the application program whitepackization of expander graphs spirit model protection system and side
Method.
Background technology
The concept of white-box attack was proposed earliest by Chow et al. in 2002.White-box attack is different from traditional black box and attacks
It hits, under whitepack environment, white-box attack assumes that attacker possesses completely device end (i.e. the running environment of application program)
Control ability can be observed and change all internal datas when application program is run, and attacker has stronger means capability.
Attacker can to binary system tracking that program is run, read data in memory, the intermediate result that procedures of observation performs, arbitrary
Static analysis and change result etc. of oneself calculation.Therefore the application program salvo of traditional anti-black box attack is not enough to
Tackle white-box attack.At present, the white-box techniques of academia are mostly used for the protection to cryptographic algorithm, and field is narrow.And
Commercial field, the code protection method of some whitepacks, there are mainly four types of:First, code controls levelling exhibitionization;Refer to second is that increasing
Make complexity;Third, control stream is forged;Fourth, use virtual machine technique.Although these methods have used the multiple hand in engineering
Section, but attacker still can break through these protection techniques under certain acceptable cost.It is and of the invention by whitepack skill
The whitepackization to application program that art is applied to information security field is protected, and uses the whitepack code protection skill based on look-up table
Art can not only be effective against attacker in engineering, and can be from its security of academicly theoretical proof, this is the present invention white
A big innovative point on box code protection.
1936, Alan Turing proposed Turing machine computation model, and basic model is the single tape figure spirit of a deterministic type
Machine, it, can be under finite state controller in belt there are one read/write head by the use of the belt of an endless as infinite memory
It upper reading and writing and moves left and right, each step of operation is all to determine uniquely.Based on the clever model of figure, there are many expanded applications.This
Invention is exactly a kind of extension based on the clever model of figure.
The content of the invention
The technical issues of present invention is mainly solved present in the prior art;It provides a kind of by the way that carrying whitepack is called to look into
The whitepack instruction set of table is looked for, the whitepackization protection to the relevant key code of in application program and computing is realized, so that should
The white-box attack under whitepack environment can be effective against with program.
The above-mentioned technical problem of the present invention is mainly what is be addressed by following technical proposals:
A kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system, which is characterized in that is
It is under unified central planning to be equipped with:
Whitepack computing engines:Be configured to transfer in whitepack Code Generator code with it is white in instruction module
Box instructs, and completes what is instructed to needing to carry out the crucial non-whitepack arithmetic operation of the setting of whitepack protection in destination application
Mapping is replaced, while the search rule in being instructed according to whitepack searches the look-up table formulated, and the output of look-up table is mutually meets the tendency of
Calculate the output result of operation;
Whitepack Code Generator:It is configurable to generate the whitepack code of application program and whitepack instruction set, and energy
The call instruction that whitepack computing engines instruct corresponding whitepack is enough received, non-whitepackization instruction is replaced, code to be protected is changed
Into corresponding whitepack instruction stream.Storehouse is searched with the whitepack in system simultaneously and carries out cooperating, whitepack is searched storehouse and can be generated accordingly
Look-up table, instrument calls corresponding whitepack look-up table under the operation of computing engines, enters data into whitepack look-up table
The lookup of output result is carried out,.Whitepack Code Generator includes:Code and instruction module store data module, are random double
Penetrate module;
Whitepack searches storehouse:The database that the system of being configured as carries is the resource for generating whitepack look-up table, can will be permitted
The intermediate result of multiple instruction flow operation generation is stored in the net structure of substantial amounts of look-up table composition, and can receive whitepack
The calling of Code Generator provides the data searched needed for whitepack Code Generator.
The invention carries out following improvement:The system is in the compilation phase, under the operation of whitepack computing engines,
Using whitepack Code Generator, code to be protected is transformed into corresponding whitepack instruction stream, while is equipped with corresponding process
The whitepack look-up table of random dijection treated whitepack searches storehouse generation.After the completion of compilation phase, answering after generation whitepack protection
With the whitepack instruction stream of program, whitepack instruction stream is called under the operation of computing engines at the random dijection of process of outfit
The whitepack look-up table of reason carries out the operation of data, identical with the function of original code on the whitepack code function after generation, but
Anti- white-box attack ability under whitepack environment is improved.This method is:It is called by the whitepack computing engines in system white
Box instructs and the whitepack look-up table by random dijection processing, and code to be protected is transformed into corresponding whitepack instruction stream, is realized
The whitepackization of the relevant key code of in application program and computing is protected, so that application program can be effective against whitepack
A series of attacks under environment.
System, whitepack are protected in a kind of above-mentioned application program whitepackization based on whitepack instruction and expander graphs spirit model
Code Generator is configured with:
Code and instruction module:Being configurable to generate needs the whitepack instruction stream of application program to be protected;Store data mould
Block:The whitepack code and whitepack instruction and storage for being configured as the need application program to be protected of storage generation to be adjusted
Source data and the result data of storage;
Random dijection module:It is configured as needing to carry out in destination application the non-whitepack of the setting of whitepack protection
After arithmetic operation instruction carries out mapping replacement, random dijection protection is carried out..
The flow chart of intermodule is as shown in Figure 2.
In a kind of above-mentioned application program whitepack protection system based on whitepack instruction and expander graphs spirit model, at random
The meaning of dijection is:Random dijection F refers to a m bit to the stochastic transformation of n-bit, F-1It is its inverse transformation.Its effect is
By the input of a look-up table and export into row stochastic upset, random dijection F and its inverse transformation F-1Do not go out on same table
It is existing, but intersperse among in the complicated network structure of substantial amounts, due to network structure it is complicated alternately and substantial amounts,
So that the algorithm in table corresponding to data cannot be derived from the input and output of a table, so as to protect the number in look-up table
According to.
A kind of application program whitepack guard method instructed based on whitepack with expander graphs spirit model, which is characterized in that logical
The whitepack computing engines crossed in system call whitepack instruction and the whitepack look-up table by random dijection processing, by code to be protected
It is transformed into corresponding whitepack instruction stream, realizes the whitepackization protection to the relevant key code of in application program and computing, with
Allow the application to be effective against a series of attacks under whitepack environment.The exemplary plot of method is as shown in Figure 1.
A kind of referred to above-mentioned based on whitepack instruction and the application program whitepack guard method of expander graphs spirit model, whitepack
It makes as the instruction of 4 tuples:
WBCInstruction=(src1, src2, dst, table_rule).
A kind of drawn above-mentioned based on whitepack instruction and the application program whitepack guard method of expander graphs spirit model, calculating
Holding up the process that the instruction of the whitepack in whitepack instruction set is called to be protected is:Corresponding data are found first in whitepack instruction to exist
The position of database, i.e. src1, the position of src2 meanings and the storage location of result data, then utilize search rule
Table_rule carries out table lookup operation into look-up table and finds corresponding data, obtain whitepackization processing as a result, and value is returned
Return to the storage location dst of corresponding result data, in whole process, the flowing of data all carries out within system, not with
Its exterior has any data interaction..
In a kind of above-mentioned application program whitepack guard method based on whitepack instruction set and expander graphs spirit model, the party
Method is based on expander graphs spirit model, is one 7 tuple WBX_S=(S, Γ, ∑, σ, q on model0, qf, T), wherein, S is one
A finite state collection;Γ is a limited tape character collection;Represent input character set;σ is the shape in system
State is changed the mechanism, q0∈ S are the beginning states of system;qf∈ S are the reception states of system, that is, the state after changing;T is to be
Look-up table in system, remains unchanged in systems.
In a kind of above-mentioned application program whitepack guard method based on whitepack instruction set and expander graphs spirit model, σ is
State transition mechanism process in system is:, corresponding whitepack is called to instruct, is completed to needing to carry out whitepack guarantor in application program
The mapping of the non-whitepack instruction of shield is replaced, σ (q, x)=(q ', W, { src, dst, Flag }), wherein x,This turn
When exchange the letters number σ represents that system is in state q, the non-whitepack instruction for if desired carrying out whitepack protection is instruction x, at this time state transformation
For q ', then instruction is become into whitepack instruction w, at this point, the transition state of computing engines is represented by { src, dst, Flag }, wherein
Src represents the original state of computing engines, i.e., the initial position that computing engines are directed toward, and dst represents the reception state of computing engines,
Position after the variation that i.e. computing engines are directed toward, Flag represent that instruction does not convert for 0, represent to convert for 1.
Therefore, the invention has the advantages that:1. whitepack protection technique and random dijection technology based on look-up table
With preferable safety examination and proof can be obtained in theory;2. the data, code in system have closure, outside
The data of portion's insertion cannot disturb the data of internal system;3. the complicated network structure of look-up table, similar to nerve net
Network structure, the complexity of conversed analysis is high, and anti-attack ability is excellent.
Description of the drawings
Attached drawing 1 is the method exemplary plot of the present invention.
Attached drawing 2 is the flow chart of the embodiment of the present invention.
Specific embodiment
Below with reference to the embodiments and with reference to the accompanying drawing the technical solutions of the present invention will be further described.
Embodiment:
First, the hardware configuration of the present invention is introduced first, and system of the present invention is broadly divided into three parts:Whitepack meter
It calculates engine, whitepack Code Generator, whitepack and searches Table storehouse, concrete function is:
Whitepack computing engines:Be configured to transfer in whitepack Code Generator code with it is white in instruction module
Box instructs, and completes what is instructed to needing to carry out the crucial non-whitepack arithmetic operation of the setting of whitepack protection in destination application
Mapping is replaced, while the look-up table that the search rule lookup in being instructed according to whitepack is specified, and the output of look-up table is corresponding computing
The output result of operation;
Whitepack Code Generator:The whitepack code and whitepack for being configurable to generate application program instruct, and can
The call instruction that whitepack computing engines instruct corresponding whitepack is received, non-whitepackization instruction is replaced, code to be protected is transformed into
Corresponding whitepack instruction stream.Storehouse is searched with the whitepack in system simultaneously and carries out cooperating, whitepack is searched storehouse and can be generated accordingly
Look-up table, instrument call corresponding whitepack look-up table under the operation of computing engines, enter data into whitepack look-up table into
The lookup of row output result,.Whitepack Code Generator includes:Code and instruction module, storage data module, random dijection
Module;
Whitepack searches storehouse:The database that the system of being configured as carries is the resource for generating whitepack look-up table, can will be permitted
The intermediate result of multiple instruction flow operation generation is stored in the net structure of substantial amounts of look-up table composition, and can receive whitepack
The calling of Code Generator provides the data searched needed for whitepack Code Generator.
Wherein, whitepack Code Generator is configured with:
Code and instruction module:Being configurable to generate needs the whitepack instruction stream of application program to be protected;Store data mould
Block:The whitepack code and whitepack instruction and storage for being configured as the need application program to be protected of storage generation to be adjusted
Source data and the result data of storage;
Random dijection module:It is configured as needing to carry out in destination application the non-whitepack of the setting of whitepack protection
After arithmetic operation instruction carries out mapping replacement, random dijection protection is carried out.
2nd, specific guard method of the invention is described below:
Step 1:User use the system in application program some arithmetic operations carry out whitepackization protection when, with
The system on householder's machine is installed, by the whitepack computing engines in system, calls code and finger in whitepack Code Generator
Mould whitepack instruction in the block is made, and passes through computing engines and searches corresponding look-up table;
Step 2:Whitepack instruction is 4 tuple commands: WBCInstruction=(src1, src2, dst, table_
rule).Instruction module in whitepack Code Generator finds corresponding data in storage data by random dijection module
Mould position in the block, the i.e. position of src1, src2 meaning and the storage location of result data.
Step 3::Table lookup operation is carried out using search rule table_rule find corresponding data by searching for Table storehouse,
Obtain that whitepackization is handled as a result, and value is returned to the position dst in corresponding storage data module.
Step 4:Above step complete in destination application, it is necessary to carry out the crucial non-whitepack computing of whitepack protection
The mapping of operational order is replaced, and the key operation operation after replacement in application program can effectively be protected under whitepack environment
Shield resists a series of attacks under whitepack environment.
In the present invention, system is based on a 7 tuple model developments, which is defined as:WBX_S=(S,
Г, ∑, σ, q0, qf, T) and specific explanations are:
1st, S is a finite state collection;
2nd, Γ is a limited tape character collection;
3、Represent input character set;
4th, σ is the state transition mechanism in system, mainly completes conversion by whitepack computing engines and the cooperation of whitepack instruction set
Function.Its realize function be:System starts whitepack computing engines, and corresponding whitepack is called to instruct, is completed to application program
The middle mapping for needing to carry out the non-whitepack instruction of whitepack protection is replaced.σ (q, x)=(q ', W, { src, dst, Flag }).Wherein x,When this transfer function σ represents that system is in state q, the non-whitepack instruction for if desired carrying out whitepack protection is instruction
X, at this time state transformation be q ', then by instruction become whitepack instruction W, at this point, the transition state of computing engines by src, dst,
Flag } it represents, wherein src represents the original state (initial position that engine is directed toward) of computing engines, and dst represents computing engines
Reception state (position after the variation that engine is directed toward), Flag represent that instruction does not convert for 0, represent to convert for 1.
5、q0∈ S are the beginning states of system;
6、qf∈ S are the reception states of system, that is, the state after changing.
7th, T is the look-up table in system, is remained unchanged in systems.
Specific embodiment described herein is only to spirit explanation for example of the invention.Technology belonging to the present invention is led
The technical staff in domain can do various modifications or additions to described specific embodiment or replace in a similar way
Generation, but without departing from spirit of the invention or beyond the scope of the appended claims.
Claims (9)
1. a kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system, which is characterized in that system
It is configured with:
Whitepack computing engines:It is configured to transfer code in whitepack Code Generator with the whitepack in instruction module to refer to
The mapping to needing to carry out the crucial non-whitepack arithmetic operation of the setting of whitepack protection to instruct in destination application is completed in order
It replaces, while the look-up table that the search rule lookup in being instructed according to whitepack is specified, the output of look-up table is corresponding arithmetic operation
Output result;
Whitepack Code Generator:The whitepack code and whitepack for being configurable to generate application program instruct, and can receive
The call instruction that whitepack computing engines instruct corresponding whitepack replaces non-whitepackization instruction, code to be protected is transformed into accordingly
Whitepack instruction stream;Storehouse is searched with the whitepack in system simultaneously and carries out cooperating, whitepack, which searches storehouse, can generate corresponding lookup
Table, instrument call corresponding whitepack look-up table under the operation of computing engines, enter data into whitepack look-up table carry out it is defeated
Go out the lookup of result,;Whitepack Code Generator includes:Code and instruction module, storage data module, random double injection mould
Block;
Whitepack searches storehouse:The database that the system of being configured as carries is the resource for generating whitepack look-up table, can be by many fingers
The intermediate result of order stream operation generation is stored in the net structure of substantial amounts of look-up table composition, and can receive whitepack code
The calling of Core Generator provides the data searched needed for whitepack Code Generator.
2. a kind of application program whitepackization based on whitepack instruction and expander graphs spirit model according to claim 1 protects system
System, which is characterized in that the work period of computing engines is:Computing engines complete mapping and replace and search corresponding look-up table
Afterwards, it is considered as a work period of computing engines.
3. a kind of application program whitepackization based on whitepack instruction and expander graphs spirit model according to claim 1 protects system
System, which is characterized in that whitepack Code Generator is configured with:
Code and instruction module:Being configurable to generate needs the whitepack instruction stream of application program to be protected;
Store data module:The whitepack code and whitepack for being configured as the need application program to be protected of storage generation instruct,
And store the result data of the source data to be called and storage;
Random dijection module:It is configured as needing to carry out in destination application the non-whitepack computing of the setting of whitepack protection
After operational order carries out mapping replacement, random dijection protection is carried out.
4. a kind of application program whitepackization based on whitepack instruction and expander graphs spirit model according to claim 3 protects system
The random dijection module of system, it is characterised in that:
Random dijection F refers to a m bit to the stochastic transformation of n-bit, F-1It is its inverse transformation;It is by a lookup that it, which is acted on,
The input of table is with exporting into row stochastic upset, random dijection F and its inverse transformation F-1Do not occur on same table, but spread
In the complicated network structure of substantial amounts, due to network structure it is complicated alternately and substantial amounts so that from one
The algorithm in table corresponding to data cannot be derived in the input and output of table, so as to protect the data in look-up table.
It is 5. a kind of based on whitepack instruction and the application program whitepack guard method of expander graphs spirit model, which is characterized in that pass through
Whitepack computing engines in system call whitepack instruction and the whitepack look-up table by random dijection processing, and code to be protected is turned
Become corresponding whitepack instruction stream, realize the whitepackization protection to the relevant key code of in application program and computing, so that
Obtain a series of attacks that application program can be effective against under whitepack environment.
6. a kind of application program whitepack guard method instructed based on whitepack with expander graphs spirit model according to claim 5,
It is characterized in that, instruction of the whitepack instruction for 4 tuples:WBCInstruction=(src1, src2, dst, table_rule).
7. a kind of application program whitepackization protection side based on whitepack instruction and expander graphs spirit model according to claim 5
Method, which is characterized in that computing engines call the process protected of whitepack instruction to be:It is found first in whitepack instruction corresponding
Data are in the position of database, i.e. src1, the position of src2 meanings and the storage location dst of result data, then using looking into
Regular table-rule is looked for carry out table lookup operation into look-up table and finds corresponding data, obtain whitepackization processing as a result, simultaneously
The storage location dst back to corresponding result data will be worth, in whole process, the flowings of data all within system into
Row, does not there is any data interaction with its exterior.
8. a kind of application program whitepackization protection side based on whitepack instruction and expander graphs spirit model according to claim 6
Method, which is characterized in that this method be based on expander graphs spirit model, on model be a 7 tuple WBX_S=(S, Γ, ∑, σ,
q0, qf, T), wherein, S is a finite state collection;Γ is a limited tape character collection;Represent input word
Symbol collection;σ be system in state transition mechanism, q0∈ S are the beginning states of system;qf∈ S are the reception states of system, i.e.,
State after variation;T is the look-up table in system, is remained unchanged in systems.
It is 9. according to claim 8 a kind of based on whitepack instruction set and the protection of the application program whitepackization of expander graphs spirit model
Method, which is characterized in that σ is that the state transition mechanism process in system is:Corresponding whitepack is called to instruct, is completed to applying journey
The mapping for carrying out the non-whitepack instruction of whitepack protection is needed to replace in sequence, σ (q, x)=(q ', W, { src, dst, Flag }), wherein
X,When this transfer function σ represents that system is in state q, if desired carrying out the non-whitepack instruction of whitepack protection is
Instruct x, at this time state transformation be q ', then by instruction become whitepack instruction W, at this point, the transition state of computing engines by src,
Dst, Flag } it represents, wherein src represents the original state of computing engines, i.e., the initial position that computing engines are directed toward, and dst is represented
Position after the variation that the reception state of computing engines, i.e. computing engines are directed toward, Flag represent that instruction does not convert for 0, are 1 table
It is shown as converting.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711379083.XA CN108090349A (en) | 2017-12-19 | 2017-12-19 | A kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711379083.XA CN108090349A (en) | 2017-12-19 | 2017-12-19 | A kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108090349A true CN108090349A (en) | 2018-05-29 |
Family
ID=62177482
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711379083.XA Pending CN108090349A (en) | 2017-12-19 | 2017-12-19 | A kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108090349A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101491001A (en) * | 2006-07-12 | 2009-07-22 | 皇家飞利浦电子股份有限公司 | Tamper resistance of a digital data processing unit |
US20130010963A1 (en) * | 2011-07-07 | 2013-01-10 | Farrugia Augustin J | Multiplicative splits to protect cipher keys |
CN105099666A (en) * | 2015-06-26 | 2015-11-25 | 中国科学院信息工程研究所 | White-box cryptography system for confusing wheel boundary and method |
CN105681025A (en) * | 2016-01-29 | 2016-06-15 | 中国科学院信息工程研究所 | Security white box realizing method and device for national cipher standard algorithm SM4 |
CN106059752A (en) * | 2016-07-04 | 2016-10-26 | 中国科学院信息工程研究所 | White-box cryptography encryption-decryption method based on expansion ciphertext |
US20170033921A1 (en) * | 2015-07-30 | 2017-02-02 | Nxp, B.V. | Encoding Values by Pseudo-Random Mask |
CN107005404A (en) * | 2014-11-10 | 2017-08-01 | 德国捷德有限公司 | The whitepack of reinforcing realizes 1 |
-
2017
- 2017-12-19 CN CN201711379083.XA patent/CN108090349A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101491001A (en) * | 2006-07-12 | 2009-07-22 | 皇家飞利浦电子股份有限公司 | Tamper resistance of a digital data processing unit |
US20130010963A1 (en) * | 2011-07-07 | 2013-01-10 | Farrugia Augustin J | Multiplicative splits to protect cipher keys |
CN107005404A (en) * | 2014-11-10 | 2017-08-01 | 德国捷德有限公司 | The whitepack of reinforcing realizes 1 |
CN105099666A (en) * | 2015-06-26 | 2015-11-25 | 中国科学院信息工程研究所 | White-box cryptography system for confusing wheel boundary and method |
US20170033921A1 (en) * | 2015-07-30 | 2017-02-02 | Nxp, B.V. | Encoding Values by Pseudo-Random Mask |
CN105681025A (en) * | 2016-01-29 | 2016-06-15 | 中国科学院信息工程研究所 | Security white box realizing method and device for national cipher standard algorithm SM4 |
CN106059752A (en) * | 2016-07-04 | 2016-10-26 | 中国科学院信息工程研究所 | White-box cryptography encryption-decryption method based on expansion ciphertext |
Non-Patent Citations (1)
Title |
---|
吴蒙 等: ""白盒AES加密在软件保护中的应用"", 《科技信息化》 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Demertzis et al. | Dynamic searchable encryption with small client storage | |
Wang et al. | Searchable encryption over feature-rich data | |
Degano et al. | Axiomatizing net computations and processes | |
CN103279713B (en) | A kind of social network diagram data publication method for secret protection of optimization | |
US9576244B2 (en) | Methods and systems of four-valued simulation | |
KR100960120B1 (en) | Signature String Storing Memory Structure and the Storing Method for the Same, Signature String Pattern Matching Method | |
Zhuang et al. | A pilot study of query-free adversarial attack against stable diffusion | |
Kim et al. | A privacy-preserving kNN classification algorithm using Yao's garbled circuit on cloud computing | |
CN106610995A (en) | Ciphertext index creating method, device and system | |
Whitley | Mk landscapes, NK landscapes, MAX-kSAT: A proof that the only challenging problems are deceptive | |
Fan et al. | Towards efficient authenticated subgraph query service in outsourced graph databases | |
CN104123503B (en) | CNF formula data protection method in SAT problem solving outsourcing process | |
Parekh et al. | Learning DFA from simple examples | |
CN105933120A (en) | Spark platform-based password hash value recovery method and device | |
CN111475838A (en) | Graph data anonymizing method, device and storage medium based on deep neural network | |
Li | Research of key technologies on encrypting vector spatial data in oracle spatial | |
Guo et al. | LuxGeo: Efficient and Security-Enhanced Geometric Range Queries | |
CN105843859B (en) | The method, apparatus and equipment of data processing | |
CN108090349A (en) | A kind of application program whitepackization based on whitepack instruction and expander graphs spirit model protects system and method | |
Lueker | A transformation for adding range restriction capability to dynamic data structures for decomposable searching problems | |
Guan et al. | Achieving privacy-preserving discrete frchet distance range queries | |
Zhang et al. | Sorel: Efficient and secure ore-based range query over outsourced data | |
Zhang et al. | Secure cipher index over encrypted character data in database | |
KR101049072B1 (en) | The method of mapping using identification data | |
CN109829056A (en) | Predicate explains the fact that template-driven Abductive reasoning method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180529 |