Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Brecht Wyseur is active.

Publication


Featured researches published by Brecht Wyseur.


Science of Computer Programming | 2008

Remote attestation on legacy operating systems with trusted platform modules

Dries Schellekens; Brecht Wyseur; Bart Preneel

A lot of progress has been made to secure network communication, e.g., through the use of cryptographic algorithms. However, this offers only a partial solution as long as the communicating end points still suffer from security problems. A number of applications require remote verification of software executing on an untrusted platform. Trusted computing solutions propose to solve this problem through software and hardware changes, typically a secure operating system and the addition of a secure coprocessor respectively. On the other hand, timed execution of code checksum calculations aims for a solution on legacy platforms, but can not provide strong security assurance. We present a mixed solution by using the trusted computing hardware, namely the time stamping functionality of the trusted platform module, in combination with a timing based remote code integrity verification mechanism. In this way, we do not require a secure operating system, but at the same time the overall security of the timed execution scheme can be improved.


international conference on selected areas in cryptography | 2007

Cryptanalysis of white-box DES implementations with arbitrary external encodings

Brecht Wyseur; Wil Michiels; Paul Gorissen; Bart Preneel

At DRM 2002, Chow et al. [4] presented a method for implementing the DES block cipher such that it becomes hard to extract the embedded secret key in a white-box attack context. In such a context, an attacker has full access to the implementation and its execution environment. In order to provide an extra level of security, an implementation shielded with external encodings was introduced by Chow et al. and improved by Link and Neumann [10]. In this paper, we present an algorithm to extract the secret key from such white-box DES implementations. The cryptanalysis is a differential attack on obfuscated rounds, and works regardless of the shielding external encodings that are applied. The cryptanalysis has a average time complexity of 214 and a negligible space complexity.


international conference on cryptology in india | 2010

Cryptanalysis of a Perturbated White-Box AES Implementation

Yoni De Mulder; Brecht Wyseur; Bart Preneel

In response to various cryptanalysis results on white-box cryptography, Bringer et al. presented a novel white-box strategy. They propose to extend the round computations of a block cipher with a set of random equations and perturbations, and complicate the analysis by implementing each such round as one system that is obfuscated with annihilating linear input and output encodings. The improved version presented by Bringer et al. implements the AEw/oS, which is an AES version with key-dependent S-boxes (the S-boxes are in fact the secret key). In this paper we present an algebraic analysis to recover equivalent keys from the implementation. We show how the perturbations and system of random equations can be distinguished from the implementation, and how the linear input and output encodings can be eliminated. The result is that we have decomposed the white-box implementation into a much more simple, functionally equivalent implementation and retrieved a set of keys that are equivalent to the original key. Our cryptanalysis has a worst time complexity of 217 and a negligible space complexity.


information security solutions europe | 2010

RE-TRUST: Trustworthy Execution of SW on Remote Untrusted Platforms

Brecht Wyseur

A major challenge in software security is preserving software integrity. Traditionally this problem is addressed through the development of software (self-) checking techniques that verify the integrity of its code and execution. Unfortunately no satisfactory solutions for run-time verification of software integrity have been presented. In this paper, we approach the problem of run-time software integrity verification in a networked context. That is, we present techniques to enable remote verification of the execution of software, given the availability of a continuous network connection between the verification entity and the untrusted execution platform.


international conference on automated production of cross media content for multi channel distribution | 2007

Security Model for a Shared Multimedia Archive

Karel Wouters; Brecht Wyseur; Bart Preneel

Broadcasters and production houses are moving toward tape-less digital production environments for generating their multimedia content. Consequently, they are in need of a digital archive to store their new multimedia content. Ideally, this archive is closely integrated into the production environment, and enables its owners to share their content with others. In this paper, investigate the threats, associated with a shared digital multimedia archive and we describe a security model for such an archive In our approach of the model, we try to spread the security measures as wide as possible, such that single points of failure or compromise have a minimal impact on the security of the system.


Encyclopedia of Cryptography and Security (2nd Ed.) | 2011

White-Box Cryptography

Brecht Wyseur


Proceedings of the 26th Symposium on Information Theory in the Benelux | 2005

Condensed White-Box Implementations

Brecht Wyseur; Bart Preneel


IACR Cryptology ePrint Archive | 2008

White-Box Cryptography: Formal Notions and (Im)possibility Results.

Amitabh Saxena; Brecht Wyseur; Bart Preneel


arXiv: Cryptography and Security | 2008

On White-box Cryptography and Obfuscation.

Amitabh Saxena; Brecht Wyseur


Archive | 2004

Software Security Techniques

Jan Cappaert; Brecht Wyseur; Bart Preneel

Collaboration


Dive into the Brecht Wyseur's collaboration.

Top Co-Authors

Avatar

Bart Preneel

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Karel Wouters

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Yoni De Mulder

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dries Schellekens

Katholieke Universiteit Leuven

View shared research outputs
Top Co-Authors

Avatar

Jan Cappaert

Katholieke Universiteit Leuven

View shared research outputs
Researchain Logo
Decentralizing Knowledge