Whitebox cryptography has become a key protection for embedded mobile software products. On top of reverse engineering threats, new techniques making use of side-channel attacks have been developed and prove very efficient to recover secrets in a black box model on binaries.
eshard has developed one of the most advanced products combining state-of-the-art binary manipulation and attack techniques, called esDynamic. This tool includes advanced tracer and faulter modules on binaries. Combining this whitebox module with the side-channel module, esDynamic can be used to achieve the whole secret key extraction on a given binary.
Last week, we hosted a couple of sessions on how to recover secrets in whitebox cryptography using esDynamic platform’s whitebox module and provided examples to illustrate entire key recovery exploits on cryptographic libraries.
If you didn’t get a chance to attend either of last weeks’ sessions, don’t worry. You can request a recording if you’d still like to see a demo. We’re planning to launch a couple more sessions early June. If you would like to be updated on the dates, please watch this space or contact us to be added to our mailing list.