New WBC paper on e-print (2015/753) which exposes a technique coined "Differential Computation Analysis" that can be used to reverse engineer white-box implementations.2014
Yoni finished his PhD on White-Box Cryptography at the University of Leuven. See https://www.cosic.esat.kuleuven.be/publications/thesis-235.pdf for his dissertation. This includes his recent publication on White-Box AES, as published on e-print (2013/450)August 2012
Yoni de Mulder has published his cryptanalysis of the Xiao-Lai white-box AES implementation.April 2012
ABSTRACT: In the white-box attack context, i.e., the setting where an implementation of a cryptographic algorithm is executed on an untrusted platform, the adversary has full access to the implementation and its execution environment. In 2002, Chow et al. presented a white-box AES implementation which aims at preventing key-extraction in the white-box attack context. However, in 2004, Billet et al. presented an efficient practical attack on Chow et al.'s white-box AES implementation. In response, in 2009, Xiao and Lai proposed a new white-box AES implementation which is claimed to be resistant against Billet et al.'s attack. This paper presents a practical cryptanalysis of the white-box AES implementation proposed by Xiao et al. The linear equivalence algorithm presented by Biryukov et al. is used as a building block. The cryptanalysis efficiently extracts the AES key from Xiao et al.'s white-box AES implementation with a work factor of about 2^32.
SysK has published his attack on my WB-DES challenge in Phrack. See http://phrack.org
Contact me if pointers are missing! (yes, there are)