@article{Porkodi_Sivaram_Mohammed_Manikandan_2018, title={Survey on White-Box Attacks and Solutions}, volume={7}, url={https://ojs.trp.org.in/index.php/ajcst/article/view/1904}, DOI={10.51983/ajcst-2018.7.3.1904}, abstractNote={<p>This Research paper provides special white-box attacks and outputs from it. Wearable IoT units perform keep doubtlessly captured, then accessed within an unauthorized behavior due to the fact concerning their bodily nature. That case, they are between white-box attack systems, toughness the opponent may additionally have quantity,visibility about the implementation of the inbuilt crypto system including complete control over its solution platform. The white-box attacks on wearable devices is an assignment without a doubt. To serve as a countermeasure in opposition to these problems in such contexts, here analyzing encryption schemes in imitation of protecting the confidentiality concerning records against white-box attacks. The lightweight encryption, intention in accordance with protecting the confidentiality over data towards white-box attacks is the recently stability good algorithm. In that paper, we read the extraordinary algorithms too.</p>}, number={3}, journal={Asian Journal of Computer Science and Technology }, author={Porkodi, V. and Sivaram, M. and Mohammed, Amin Salih and Manikandan, V.}, year={2018}, month={Oct.}, pages={28–32} }