Star 0

Abstract

Can you break cryptography implementations without being a cryptographer? The answer is yes. The talk will cover some novel applications of the less-than-rocket-science attacks on cryptography implementations in software, adapted from similar hardware attacks already being used for decades. The talk will show how to attack any protected crypto, including white-box cryptography, regardless of the obfuscation and with minimal to no reverse engineering, using common-off-the-shelf and FOSS tools.

Slides