Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

White box (software engineering)

Known as: Glass box, White box (engineering), White box 
A white box (or glass box, clear box, or open box) is a subsystem whose internals can be viewed but usually not be altered. Having access to the… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Neural networks are vulnerable to adversarial examples, which poses a threat to their application in security sensitive systems… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Highly Cited
2018
Highly Cited
2018
We construct targeted audio adversarial examples on automatic speech recognition. Given any audio waveform, we can produce… Expand
  • figure 1
  • figure 3
  • figure 2
Is this relevant?
Highly Cited
2016
Highly Cited
2016
Although white-box regression test prioritization has been well-studied, the more recently introduced black-box prioritization… Expand
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2015
2015
The need for software security in untrusted environments is ever increasing. White-box cryptography aims to ensure the security… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
Highly Cited
2012
Highly Cited
2012
Software testing is the process to uncover requirement, design and coding errors in the program. It is used to identify the… Expand
  • figure 1
  • figure 3
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In order to protect AES software running on untrusted platforms, Chow et al. (2002) designed a white-box implementation. However… Expand
Is this relevant?
Highly Cited
2006
Highly Cited
2006
At CMS 2006 Bringer et al. show how to conceal the alge- braic structure of a \traceable block cipher" by adding perturbations to… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
Highly Cited
2004
Highly Cited
2004
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We present a flexible architecture for trusted computing, called Terra, that allows applications with a wide range of security… Expand
  • figure 1
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Conventional software implementations of cryptographic algorithms are totally insecure where a hostile user may control the… Expand
  • figure 1
  • figure 2
Is this relevant?