Whitebox Attacks… on Hardware?
In our very first Cloakable blog post, we discussed why whitebox cryptography is so important when...
Read MoreIn our very first Cloakable blog post, we discussed why whitebox cryptography is so important when...
Read MoreOfttimes it has been difficult to explain the role of software protection in hardware-protected secure systems, but recently security researchers have helped us out by providing many examples of zero-day exploits where flaws that are baked into hardware or firmware lead to exploitable vulnerabilities in systems. In this article we are having a look at Spectre & Meltdown and explore how these attacks could have been avoided using application protection technology.
Read More