Academic literature on the topic 'White-box attack'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'White-box attack.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "White-box attack"
Chen, Jinghui, Dongruo Zhou, Jinfeng Yi, and Quanquan Gu. "A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (April 3, 2020): 3486–94. http://dx.doi.org/10.1609/aaai.v34i04.5753.
Full textJosse, Sébastien. "White-box attack context cryptovirology." Journal in Computer Virology 5, no. 4 (August 2, 2008): 321–34. http://dx.doi.org/10.1007/s11416-008-0097-x.
Full textPorkodi, V., M. Sivaram, Amin Salih Mohammed, and V. Manikandan. "Survey on White-Box Attacks and Solutions." Asian Journal of Computer Science and Technology 7, no. 3 (November 5, 2018): 28–32. http://dx.doi.org/10.51983/ajcst-2018.7.3.1904.
Full textALSHEKH, MOKHTAR, and KÖKSAL ERENTÜRK. "DEFENSE AGAINST WHITE BOX ADVERSARIAL ATTACKS IN ARABIC NATURAL LANGUAGE PROCESSING (ANLP)." International Journal of Advanced Natural Sciences and Engineering Researches 7, no. 6 (July 25, 2023): 151–55. http://dx.doi.org/10.59287/ijanser.1149.
Full textPark, Hosung, Gwonsang Ryu, and Daeseon Choi. "Partial Retraining Substitute Model for Query-Limited Black-Box Attacks." Applied Sciences 10, no. 20 (October 14, 2020): 7168. http://dx.doi.org/10.3390/app10207168.
Full textZhou, Jie, Jian Bai, and Meng Shan Jiang. "White-Box Implementation of ECDSA Based on the Cloud Plus Side Mode." Security and Communication Networks 2020 (November 19, 2020): 1–10. http://dx.doi.org/10.1155/2020/8881116.
Full textLIN, Ting-Ting, and Xue-Jia LAI. "Efficient Attack to White-Box SMS4 Implementation." Journal of Software 24, no. 8 (January 17, 2014): 2238–49. http://dx.doi.org/10.3724/sp.j.1001.2013.04356.
Full textZhang, Sicheng, Yun Lin, Zhida Bao, and Jiangzhi Fu. "A Lightweight Modulation Classification Network Resisting White Box Gradient Attacks." Security and Communication Networks 2021 (October 12, 2021): 1–10. http://dx.doi.org/10.1155/2021/8921485.
Full textGao, Xianfeng, Yu-an Tan, Hongwei Jiang, Quanxin Zhang, and Xiaohui Kuang. "Boosting Targeted Black-Box Attacks via Ensemble Substitute Training and Linear Augmentation." Applied Sciences 9, no. 11 (June 3, 2019): 2286. http://dx.doi.org/10.3390/app9112286.
Full textJiang, Yi, and Dengpan Ye. "Black-Box Adversarial Attacks against Audio Forensics Models." Security and Communication Networks 2022 (January 17, 2022): 1–8. http://dx.doi.org/10.1155/2022/6410478.
Full textDissertations / Theses on the topic "White-box attack"
Koski, Alexander. "Randomly perturbing the bytecode of white box cryptography implementations in an attempt to mitigate side-channel attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-273928.
Full textDenna studie tar ett steg längre i att skapa ett verktyg som automatiskt höjer säkerheten på kryptografiska implementationer. I white box-kryptografi är krypteringsnyckeln som används redan gömd inuti den valda krypteringsalgoritmen. En användare med onda intentioner kan vilja försöka att extrahera denna gömda krypteringsnyckel genom att utföra en typ utav side-channel -attack, differential computational analys, vilket flera white box-implementationer är sårbara för. Tekniken för att öka säkerheten hos dessa white box-implementationer som utforskas i denna studie går ut på att slumpmässigt, med olika sannolikheter störa white box-implementationen genom att addera värdet ett (1) till en godtycklig variabel mitt under programmets körning. Detta sänker korrektheten på outputen från alla de tre testade white box-implementationerna olika mycket, men vissa störningar kan utföras och fortfarande resultera i hög korrekthet. Att sätta in sådana störningar i white box-implementationerna har ingen större inverkan på dess totala exekveringstid. Utav 100 000 möjliga ställen att sätta in en störning på valdes 25 utav dessa att undersökas vidare. I ett utav dessa fall ökade säkerheten på white box-implementationen, men i fyra liknande fall minskade säkerheten, annars på övriga störningspunkter fanns det inga tecken på en förändring i säkerhet. Ett mer sofistikerat sätt att identifiera de bästa störningspunkterna på behöver därför utredas för att bygga vidare på detta arbete med att öka säkerheten hos kryptografiska implementationer genom att utsätta dem för slumpmässiga störningar och samtidigt kunna hålla hög korrekthet i programmets resultat.
Marion, Damien. "Multidimensionality of the models and the data in the side-channel domain." Thesis, Paris, ENST, 2018. http://www.theses.fr/2018ENST0056/document.
Full textSince the publication in 1999 of the seminal paper of Paul C. Kocher, Joshua Jaffe and Benjamin Jun, entitled "Differential Power Analysis", the side-channel attacks have been proved to be efficient ways to attack cryptographic algorithms. Indeed, it has been revealed that the usage of information extracted from the side-channels such as the execution time, the power consumption or the electromagnetic emanations could be used to recover secret keys. In this context, we propose first, to treat the problem of dimensionality reduction. Indeed, since twenty years, the complexity and the size of the data extracted from the side-channels do not stop to grow. That is why the reduction of these data decreases the time and increases the efficiency of these attacks. The dimension reduction is proposed for complex leakage models and any dimension. Second, a software leakage assessment methodology is proposed ; it is based on the analysis of all the manipulated data during the execution of the software. The proposed methodology provides features that speed-up and increase the efficiency of the analysis, especially in the case of white box cryptography
Vivek, B. S. "Towards Learning Adversarially Robust Deep Learning Models." Thesis, 2019. https://etd.iisc.ac.in/handle/2005/4488.
Full textBook chapters on the topic "White-box attack"
Cai, Jinghui, Boyang Wang, Xiangfeng Wang, and Bo Jin. "Accelerate Black-Box Attack with White-Box Prior Knowledge." In Intelligence Science and Big Data Engineering. Big Data and Machine Learning, 394–405. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36204-1_33.
Full textMeng, Lubin, Chin-Teng Lin, Tzyy-Ping Jung, and Dongrui Wu. "White-Box Target Attack for EEG-Based BCI Regression Problems." In Neural Information Processing, 476–88. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36708-4_39.
Full textZeyad, Mohamed, Houssem Maghrebi, Davide Alessio, and Boris Batteux. "Another Look on Bucketing Attack to Defeat White-Box Implementations." In Constructive Side-Channel Analysis and Secure Design, 99–117. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16350-1_7.
Full textLucas, Keane, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, and Saurabh Shintre. "Deceiving ML-Based Friend-or-Foe Identification for Executables." In Advances in Information Security, 217–49. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-16613-6_10.
Full textAmadori, Alessandro, Wil Michiels, and Peter Roelse. "A DFA Attack on White-Box Implementations of AES with External Encodings." In Lecture Notes in Computer Science, 591–617. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38471-5_24.
Full textLiu, Haohan, Xingquan Zuo, Hai Huang, and Xing Wan. "Saliency Map-Based Local White-Box Adversarial Attack Against Deep Neural Networks." In Artificial Intelligence, 3–14. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-20500-2_1.
Full textAlpirez Bock, Estuardo, Chris Brzuska, Wil Michiels, and Alexander Treff. "On the Ineffectiveness of Internal Encodings - Revisiting the DCA Attack on White-Box Cryptography." In Applied Cryptography and Network Security, 103–20. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-93387-0_6.
Full textBiryukov, Alex, and Aleksei Udovenko. "Attacks and Countermeasures for White-box Designs." In Lecture Notes in Computer Science, 373–402. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-03329-3_13.
Full textLepoint, Tancrède, Matthieu Rivain, Yoni De Mulder, Peter Roelse, and Bart Preneel. "Two Attacks on a White-Box AES Implementation." In Selected Areas in Cryptography -- SAC 2013, 265–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014. http://dx.doi.org/10.1007/978-3-662-43414-7_14.
Full textBiryukov, Alex, and Aleksei Udovenko. "Dummy Shuffling Against Algebraic Attacks in White-Box Implementations." In Lecture Notes in Computer Science, 219–48. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77886-6_8.
Full textConference papers on the topic "White-box attack"
Mesbah, Abdelhak, Mohamed Mezghiche, and Jean-Louis Lanet. "Persistent fault injection attack from white-box to black-box." In 2017 5th International Conference on Electrical Engineering - Boumerdes (ICEE-B). IEEE, 2017. http://dx.doi.org/10.1109/icee-b.2017.8192164.
Full textZhang, Chaoning, Philipp Benz, Adil Karjauv, Jae Won Cho, Kang Zhang, and In So Kweon. "Investigating Top-k White-Box and Transferable Black-box Attack." In 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2022. http://dx.doi.org/10.1109/cvpr52688.2022.01466.
Full textLi, Yufei, Zexin Li, Yingfan Gao, and Cong Liu. "White-Box Multi-Objective Adversarial Attack on Dialogue Generation." In Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers). Stroudsburg, PA, USA: Association for Computational Linguistics, 2023. http://dx.doi.org/10.18653/v1/2023.acl-long.100.
Full textXiao, Chaowei, Bo Li, Jun-yan Zhu, Warren He, Mingyan Liu, and Dawn Song. "Generating Adversarial Examples with Adversarial Networks." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. California: International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/543.
Full textJia, Yin, TingTing Lin, and Xuejia Lai. "A generic attack against white box implementation of block ciphers." In 2016 International Conference on Computer, Information and Telecommunication Systems (CITS). IEEE, 2016. http://dx.doi.org/10.1109/cits.2016.7546449.
Full textAzadmanesh, Maryam, Behrouz Shahgholi Ghahfarokhi, and Maede Ashouri Talouki. "A White-Box Generator Membership Inference Attack Against Generative Models." In 2021 18th International ISC Conference on Information Security and Cryptology (ISCISC). IEEE, 2021. http://dx.doi.org/10.1109/iscisc53448.2021.9720436.
Full textWang, Xiying, Rongrong Ni, Wenjie Li, and Yao Zhao. "Adversarial Attack on Fake-Faces Detectors Under White and Black Box Scenarios." In 2021 IEEE International Conference on Image Processing (ICIP). IEEE, 2021. http://dx.doi.org/10.1109/icip42928.2021.9506273.
Full textBetz, Patrick, Christian Meilicke, and Heiner Stuckenschmidt. "Adversarial Explanations for Knowledge Graph Embeddings." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/391.
Full textAmadori, Alessandro, Wil Michiels, and Peter Roelse. "Automating the BGE Attack on White-Box Implementations of AES with External Encodings." In 2020 IEEE 10th International Conference on Consumer Electronics (ICCE-Berlin). IEEE, 2020. http://dx.doi.org/10.1109/icce-berlin50680.2020.9352195.
Full textJoe, Byunggill, Insik Shin, and Jihun Hamm. "Online Evasion Attacks on Recurrent Models:The Power of Hallucinating the Future." In Thirty-First International Joint Conference on Artificial Intelligence {IJCAI-22}. California: International Joint Conferences on Artificial Intelligence Organization, 2022. http://dx.doi.org/10.24963/ijcai.2022/433.
Full text