Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools

Abstract : This talk will illustrate how standard cryptographic techniques can be applied to real-life security products and services. This article presents in detail one of the examples given in the talk. It is intended to help the audience follow that part of our presentation. We chose as a characteristic example a little noticed yet ingenious Microsoft patent by Thomlinson and Walker. The Thomlinson-Walker system distributes encrypted patches to avoid reverse engineering by opponents (who would then be able to launch attacks on unpatched users). When the proportion of users who downloaded the encrypted patch becomes big enough, the decryption key is disclosed and all users install the patch.
Type de document :
Communication dans un congrès
Xinyi Huang; Jianying Zhou. ISPEC 2014, May 2014, Fuzhou, China. Springer, 8434, pp.8-14, 2014, Lecture Notes in Computer Science. 〈10.1007/978-3-319-06320-1_2〉
Liste complète des métadonnées

https://hal.inria.fr/hal-01071319
Contributeur : Michel Abdalla <>
Soumis le : vendredi 3 octobre 2014 - 16:33:37
Dernière modification le : jeudi 11 janvier 2018 - 06:22:10

Identifiants

Collections

Citation

Michel Abdalla, Hervé Chabanne, Houda Ferradi, Julien Jainski, David Naccache. Improving Thomlinson-Walker's Software Patching Scheme Using Standard Cryptographic and Statistical Tools. Xinyi Huang; Jianying Zhou. ISPEC 2014, May 2014, Fuzhou, China. Springer, 8434, pp.8-14, 2014, Lecture Notes in Computer Science. 〈10.1007/978-3-319-06320-1_2〉. 〈hal-01071319〉

Partager

Métriques

Consultations de la notice

224