Improving Thomlinson-Walker's software patching scheme using standard cryptographic and statistical tools

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This talk will illustrate how standard cryptographic techniques can be applied to real-life security products and services. This article presents in detail one of the examples given in the talk. It is intended to help the audience follow that part of our presentation. We chose as a characteristic example a little noticed yet ingenious Microsoft patent by Thomlinson and Walker. The Thomlinson-Walker system distributes encrypted patches to avoid reverse engineering by opponents (who would then be able to launch attacks on unpatched users). When the proportion of users who downloaded the encrypted patch becomes big enough, the decryption key is disclosed and all users install the patch. © 2014 Springer International Publishing.

Cite

CITATION STYLE

APA

Abdalla, M., Chabanne, H., Ferradi, H., Jainski, J., & Naccache, D. (2014). Improving Thomlinson-Walker’s software patching scheme using standard cryptographic and statistical tools. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 8434 LNCS, pp. 8–14). Springer Verlag. https://doi.org/10.1007/978-3-319-06320-1_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free