Cloakable

Technical topics in the cybersecurity space

Skip to content
  • Home
  • About Irdeto
  • Contributors
  • Contact Us

Now you can trust the browser!

  • by Ben Gidley
  • Posted on July 10, 2017July 12, 2017
  • Evolving security

In May Tim Charman and Ben Gidley presented a talk at CodeMotion in Amsterdam showing how you can use obfuscation, whitebox and integrity verification to secure communications from the browser even in the case of a man in the middle attack.

Share this:

  • Print
  • LinkedIn
  • Twitter

Like this:

Like Loading...

Related

This entry was posted in Evolving security. Bookmark the permalink.

Post navigation

Manifesto for Cyber Security
Why you should care about whitebox cryptography

Visit our web site


Read Irdeto’s Privacy Policy

 
Truste logo

Visit our Irdeto Perspective blog

Irdeto Perspective blog

Subscribe to Blog

Click to follow this blog and receive notifications of new posts by email.

Recent Posts

  • Cybersecurity and Medical IoT Devices – Make it Trusted and SIEMple!
  • Quantum Computing, Message Security and Whitebox Cryptography
  • Black Hat 2018 – Major Innovations in the Works!
  • New Cloakware Report out now! Cloakware Report, Edition 2: “Protect Your Software. Protect Your Business.”
  • Why Secured Software is not Protected Software

Categories

  • Automotive
  • Black Hat
  • Cybersecurity and Business
  • Development
  • Evolving security
  • How-to
  • Practical Guides
  • Software Protection Technology
  • Uncategorized
  • White-Box Cryptography

Follow Us

YouTube

Twitter

LinkedIn

RSS

Tags

Alina Automated Security Checks automotive security AWS buffer overflow connected transport cryptography database design data consistency defense in depth defense model deployment distributed systems diversity docker ECU Security entanglement Hacker Hardware Security high availability HowTo HSM IDA Pro integrity verification IoT java meltdown memory scraping nosql old-school car guy perimeter renewability reverse engineering secure environment security Security Baseline software protection spectre sql Stacy Janes TEE TPM white box attacks whitebox cryptography White box cryptography

Categories

  • Automotive
  • Black Hat
  • Cybersecurity and Business
  • Development
  • Evolving security
  • How-to
  • Practical Guides
  • Software Protection Technology
  • Uncategorized
  • White-Box Cryptography

Recent Posts

  • Cybersecurity and Medical IoT Devices – Make it Trusted and SIEMple!
  • Quantum Computing, Message Security and Whitebox Cryptography
  • Black Hat 2018 – Major Innovations in the Works!
  • New Cloakware Report out now! Cloakware Report, Edition 2: “Protect Your Software. Protect Your Business.”
  • Why Secured Software is not Protected Software

Recent Comments

  • IoT Security Is Not One Chip Shopping – Cloakable on Software Protection is Like a SPIDER Web…
  • The Perimeter is a lie – an approach (part 2) – Cloakable on The perimeter is a lie (part 1)

Archives

  • January 2019
  • October 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • February 2018
  • January 2018
  • October 2017
  • September 2017
  • August 2017
  • July 2017

Privacy

Website Privacy Policy


© 2019 Irdeto. All Rights Reserved.

© Copyright 2019 - Cloakable
Magazine WordPress Themes by DesignOrbital
%d bloggers like this: