Yang Shi (Tongji University), Tianchen Gao (Tongji University), Yimin Li (Tongji University), Jiayao Gao (Tongji University), Kaifeng Huang (Tongji University)

Encryption algorithms face various key-extraction attacks, prompting a variety of defensive works under different threat models. Among these, the white-box threat model has the strongest adversarial scenario, where attackers have full access to and control over the cryptographic implementation and its execution environment. However, prior white-box encryption designs primarily protected a single key-dependent table, enabling white-box and side-channel attacks to recover the key. Based on our observation, fuzzing the boundaries of these tables can make attacks ineffective. Thus, we proposed WBSLT, a novel design framework for tabulated white-box implementations of substitution-linear transformation (SLT) ciphers. WBSLT protects key-embedded tables with linear and nonlinear transformations and partially leaves each component’s computation to the next component to mitigate single key-dependent table breach. To further defend against differential computation analysis and differential fault analysis, the framework integrates masking, shuffling and external encoding. Theoretical analysis indicates its immunity to various attacks. Experimental results validate the practicality of WBSLT across multiple computing platforms, showing efficient encryption performance and reasonable memory consumption.

View More Papers

Prompt Injection Attack to Tool Selection in LLM Agents

Jiawen Shi (Huazhong University of Science and Technology), Zenghui Yuan (Huazhong University of Science and Technology), Guiyao Tie (Huazhong University of Science and Technology), Pan Zhou (Huazhong University of Science and Technology), Neil Gong (Duke University), Lichao Sun (Lehigh University)

Read More

CryptPEFT: Efficient and Private Neural Network Inference via Parameter-Efficient...

Saisai Xia (Institute of Information Engineering, CAS), Wenhao Wang (Institute of Information Engineering, CAS), Zihao Wang (Nanyang Technological University (NTU)), Yuhui Zhang (Institute of Information Engineering, CAS), Yier Jin (University of Science and Technology of China), Dan Meng (Institute of Information Engineering, CAS), Rui Hou (Institute of Information Engineering, CAS)

Read More

Porting NASA's core Flight System to the Formally Verified...

Juliana Furgala, Samuel Jero, Andrea Lin, Rick Skowyra (MIT Lincoln Laboratory)

Read More