Robust combiners for software hardening

Amir Herzberg, Haya Shulman

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations


Practical software hardening schemes, as well as practical encryption schemes, e.g., AES, are heuristic and do not rely on provable security. One technique to enhance security is robust combiners. An algorithm C is a robust combiner for specification S, e.g., privacy, if for any two implementations X and Y , of a cryptographic scheme, the combined scheme C(X, Y ) satisfies S provided either X or Y satisfy S. We present the first robust combiners for software hardening, specifically for White-Box Remote Program Execution (WBRPE) [10]. WBRPE is a software hardening technique that is employed to protect execution of programs in remote, hostile environment. WBRPE provides a software only platform allowing secure execution of programs on untrusted, remote hosts, ensuring privacy of the program, and of the inputs to the program, as well as privacy and integrity of the result of the computation. Robust combiners are particularly important for software hardening, where there is no standard whose security is established. In addition, robust combiners for software hardening are interesting from software engineering perspective since they introduce new techniques of reductions and code manipulation.

Original languageEnglish
Title of host publicationTrust and Trustworthy Computing - Third International Conference, TRUST 2010, Proceedings
Number of pages8
StatePublished - 2010
Event3rd International Conference on Trust and Trustworthy Computing, TRUST 2010 - Berlin, Germany
Duration: 21 Jun 201023 Jun 2010

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume6101 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference3rd International Conference on Trust and Trustworthy Computing, TRUST 2010


  • White-box security
  • cryptographic protocols
  • robust combiners
  • software hardening


Dive into the research topics of 'Robust combiners for software hardening'. Together they form a unique fingerprint.

Cite this