Security in Integrated Circuit 
Company 
Blog
Contact us
eShard
/
escoaching
/
WBC Binary Instrumentation
Novice

WBC Binary Instrumentation

This practical course introduces the methodology to attack a native white-box binary: visualisation of the binary execution, localisation of the area of interest, execution of a Computational Data Analysis (CDA) or Differential Fault Analysis (DFA), and recovery of the master key from the round key. All these steps will be performed with Qemu and Unicorn frameworks.

Covered Topics

What you will learn:

  • Generate traces or faulty outputs with Unicorn, esTracer or esFaulter
  • Execute a Computation Analysis or a fault injection, such as Differential Fault Analysis (DFA)

Exercises

  • Execute a native ELF library extracted from an Android application with Unicorn
  • Create a launcher to be able to execute a native Android library with Qemu
  • Trace a native Android AES White-Box library or the DES Wyseur White-Box with esTracer or Unicorn
  • Inject faults during the execution of a native Android AES White-Box library or the DES Wyseur White-Box with esFaulter
  • Perform a computational analysis with generated traces
  • Perform a differential fault analysis with generated faulty outputs

Requirements

  • Native code analysis
  • Basic ARM Assembly language
  • Basic coding knowledge
  • Basic knowledge in side-channel analyses
2000€
Contact us

Practical informations

Overall duration: 1-day if in-person / flexible duration if online.

Schedule: 9am-1pm - 2pm-6 pm (in-person)

Number of trainees: 1 max.

Our Coaches

Guillaume
Vinet
© eShard 2021. All rights reserved
Privacy policy | Legal Notice
Bâtiment GIENAH
11 avenue de Canteranne
33600 Pessac
France
eShard Nudge
7 rue Gaston de Flotte
13012 Marseille
France
eShard GmbH
Beethovenallee 21
53173 Bonn
Germany
Paya Lebar Quarter
#04-01 Paya Lebar Link
408533
Singapore