Most recent theoretical literature on program obfuscation is based on notions like virtual black box (VBB) obfuscation and indistinguishability obfuscation (iO). These notions are very strong and are hard to satisfy. Further, they offer far more protection than is typically required in practical applications. On the other hand, the security notions introduced by software security researchers are suitable for practical designs but are not formal or precise enough to enable researchers to provide a quantitative security assurance. Hence, in this paper, we introduce a new formalism for practical program obfuscation that still allows rigorous security proofs. We believe our formalism will make it easier to analyse the security of obfuscation schemes. To show the flexibility and power of our formalism, we give a number of examples. Moreover, we explain the close relationship between our formalism and the task of providing obfuscation challenges.
Towards a theory of special-purpose program obfuscation / M.R. Asghar, S.D. Galbraith, A. Lanzi, G. Russello, L. Zobernig (IEEE ... INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS). - In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)[s.l] : IEEE, 2020. - ISBN 978-1-6654-0392-4. - pp. 394-401 (( Intervento presentato al 19. convegno International Conference on Trust, Security and Privacy in Computing and Communications tenutosi a Guangzhou nel 2020 [10.1109/TrustCom50675.2020.00061].
Towards a theory of special-purpose program obfuscation
A. Lanzi;
2020
Abstract
Most recent theoretical literature on program obfuscation is based on notions like virtual black box (VBB) obfuscation and indistinguishability obfuscation (iO). These notions are very strong and are hard to satisfy. Further, they offer far more protection than is typically required in practical applications. On the other hand, the security notions introduced by software security researchers are suitable for practical designs but are not formal or precise enough to enable researchers to provide a quantitative security assurance. Hence, in this paper, we introduce a new formalism for practical program obfuscation that still allows rigorous security proofs. We believe our formalism will make it easier to analyse the security of obfuscation schemes. To show the flexibility and power of our formalism, we give a number of examples. Moreover, we explain the close relationship between our formalism and the task of providing obfuscation challenges.File | Dimensione | Formato | |
---|---|---|---|
Towards_a_Theory_of_Special-Purpose_Program_Obfuscation.pdf
accesso aperto
Tipologia:
Publisher's version/PDF
Dimensione
184.89 kB
Formato
Adobe PDF
|
184.89 kB | Adobe PDF | Visualizza/Apri |
2011.02607.pdf
accesso aperto
Tipologia:
Pre-print (manoscritto inviato all'editore)
Dimensione
305.01 kB
Formato
Adobe PDF
|
305.01 kB | Adobe PDF | Visualizza/Apri |
Pubblicazioni consigliate
I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.