Sicurezza

Protecting an Android* x86 Native Application with Intel® Tamper Protection Toolkit

Introduction

 

Intel® Tamper Protection Toolkit, which is currently in beta, is a product focusing on runtime code integrity verification and preventing observation and reverse-engineering for binaries running on Intel® architecture devices. The objective of this tool is to protect valuable assets such as intellectual property, crypto keys, and account credentials in the source code.

Intel® Tamper Protection Toolkit Helps Protect the Scrypt Encryption Utility against Reverse Engineering

This paper discusses how Intel® Tamper Protection Toolkit helps protect critical code and valuable data against reverse-engineering and tampering attacks. It describes all components of the Intel Tamper Protection Toolkit and explains how to refactor relevant code and apply tamper protection to the Scrypt utility.
  • Sviluppatori
  • Android*
  • Microsoft Windows* 10
  • Microsoft Windows* 8.x
  • Android*
  • Windows*
  • Intermedio
  • Intel® Tamper Protection Toolkit
  • Tamper Protection Software
  • tampering
  • iprot
  • obfuscate
  • obfuscate binaries
  • obfuscate code
  • Scrypt
  • Reverse Engineering
  • Sicurezza
  • Software Protection with Intel® Tamper Protection Toolkit and Software Vulnerability Analysis

    This paper discusses how Intel® Tamper Protection Toolkit protects critical code and valuable data against reverse-engineering and tampering attacks. It focuses on a single component of Intel Tamper Protection Toolkit called iprot which is used to obfuscate binaries.
  • Sviluppatori
  • Android*
  • Microsoft Windows* 10
  • Microsoft Windows* 8.x
  • Intermedio
  • Intel® Tamper Protection Toolkit
  • Tamper Protection
  • Software tampering
  • iprot
  • obfuscate obfuscate binaries
  • obfuscate code
  • Scrypt
  • Reverse Engineering
  • Sicurezza
  • My Experiences at IDF 2015 as a Black Belt Developer: The Intel® IoT Gateway

    I also took a look at the Intel IoT Gateway. For those of you not in the know, IoT stands for Internet of Things. The Intel IoT Gateway is a wireless router that fits between the edge devices and the cloud. My first thought was, “Hey, this is just a wireless router.” Talking to the gentleman hosting the demo, my future boss, I realized the gateway is much more than just a gateway/wireless router.

    Arxan EnsureIT* 为基于英特尔® 设备的应用提供保护

    Arxan’s patented guarding technology defends applications against attacks, detects when an attack is being attempted, and responds to detected attacks with alerts and repairs. Arxan’s security products protect the confidentiality and the integrity of applications. Arxan inserts tiny code “guards” into the application binary to “lockdown” applications against attacks—with obfuscation, encryption, cryptographic key transformation, and other techniques.
  • Sviluppatori
  • Partner
  • Android*
  • Sicurezza
  • Intel® Hardware-based Security Technologies Bring Differentiation to Biometrics Recognition Applications Part 1

    How Intel® Hardware-based Security Technologies Improve the Security of Biometrics Recognition. Trusted Execution Environment with Intel® Software Guard Extensions. What is TEE? Intel® Software Guard Extensions Technology Overview. How to Harden Biometric Recognition Function by Intel® Software Guard Extensions Technology? Memory Protection Scheme with Virtual Machine Extensions. The Weakness of the Legacy Software-Based Memory Protection. Memory Protection Based on Virtual Machine Extensions. Multiple Factor Authentication with Intel® Identity Protection Technology with One-Time Password
  • Sviluppatori
  • Android*
  • Microsoft Windows* (XP, Vista, 7)
  • Microsoft Windows* 10
  • Microsoft Windows* 8.x
  • Android*
  • Tecnologia Intel® RealSense™
  • Windows*
  • Intel® Hardware-based Security
  • Biometrics Recognition
  • Trusted Execution Environment
  • Intel® Software Guard Extensions
  • Intel Identity Protection Technology
  • Tecnologia Intel® RealSense™
  • Sicurezza
  • How to Verify That OpenSSL is Using Multibuffer With Your Web Server

    This article describes how to check if the multibuffer code path is being used so that systems administrators can verify that their web server is operating as expected. Note that this procedure assumes that the web server is running on a Linux*-based system.
  • Partner
  • Linux*
  • Unix*
  • Server
  • Data center
  • Sicurezza
  • Enabling Multibuffer for AES-CBC Encryption in Apache* and nginx*

    The OpenSSL* library v1.0.2 introduces the multibuffer enhancements for AES. Multibuffer significantly increases the performance of CBC mode encryption by processing multiple TLS records in parallel on a single hardware thread. As shown in the white paper Improving OpenSSL Performance, the multibuffer enhancements to AES-CBC encryption can result in a 50 to 100% increase in throughput. This makes it an attractive feature for web site administrators using these ciphers, and this article explains how to enable it under two popular, open source, Linux*-based web servers: Apache* HTTP Server from the Apache Software Foundation, and nginx* from Nginx, Inc.
  • Partner
  • Linux*
  • Server
  • OpenSSL
  • multibuffer
  • AES Performance
  • Advanced Encryption Standard (AES)
  • Data center
  • Sicurezza
  • Iscriversi a Sicurezza