Code-Based Conjunction Obfuscation
نویسندگان
چکیده
The pattern-matching problem with wildcards can be formulated as a conjunction where an accepting string is same the pattern for all non-wild-cards. A scheme of obfuscation algorithm that “encrypt” to prevent some adversary from forging any string. Since 2013, there are abundant works about which discussed weak/strong functionality preservation and distributed black-box security. These based on generic group model, learning error assumption, noise etc. Our work proposes first strong security standard assumption. parameter constraints also resist related attacks such information set decoding attack structured arrack.
منابع مشابه
CONFUSE: LLVM-based Code Obfuscation
In the past decade, code obfuscation techniques have become increasingly popular due to their wide applications on malware and the numerous violations of intellectual property caused by reverse engineering. In this work, we examine common techniques used for code obfuscation and provide an outline of the design principles of our tool Confuse. Confuse is an LLVM tool which modifies the standard ...
متن کاملSemantics-based code obfuscation by abstract interpretation
In recent years code obfuscation has attracted research interest as a promising technique for protecting secret properties of programs. The basic idea of code obfuscation is to transform programs in order to hide their sensitive information while preserving their functionality. One of the major drawbacks of code obfuscation is the lack of a rigorous theoretical framework that makes it difficult...
متن کاملSemantic-Based Code Obfuscation by Abstract Interpretation
Interpretation Mila Dalla Preda and Roberto Giacobazzi Dipartimento di Informatica, Università di Verona Strada Le Grazie 15, 37134 Verona (Italy) [email protected] | [email protected] Abstract. In this paper we introduce a semantic-based approach for code obfuscation. The aim of code obfuscation is to prevent malicious users to disclose properties of the original source program. ...
متن کاملImplementing Conjunction Obfuscation under Entropic Ring LWE
We address the practicality challenges of secure program obfuscation by implementing, optimizing, and experimentally assessing an approach to securely obfuscate conjunction programs proposed in [1]. Conjunction programs evaluate functions f (x1, . . . , xL) = ∧ i∈I yi, where yi is either xi or ¬xi and I ⊆ [L], and can be used as classifiers. Our obfuscation approach satisfies distributional Vir...
متن کاملCode Obfuscation Literature Survey
In this paper we survey the current literature on code obfuscation and review current practices as well as applications. We analyze the different obfuscation techniques in relation to protection of intellectual property and the hiding of malicious code. Surprisingly, the same techniques used to thwart reverse engineers are used to hide malicious code from virus scanners. Additionally, obfuscati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Chinese Journal of Electronics
سال: 2023
ISSN: ['1022-4653', '2075-5597']
DOI: https://doi.org/10.23919/cje.2020.00.377