Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name

04/20/2019
by   Peter T. Breuer, et al.
0

An `obfuscation' for encrypted computing is quantified exactly here, leading to an argument that security against polynomial-time attacks has been achieved for user data via the deliberately `chaotic' compilation required for security properties in that environment. Encrypted computing is the emerging science and technology of processors that take encrypted inputs to encrypted outputs via encrypted intermediate values (at nearly conventional speeds). The aim is to make user data in general-purpose computing secure against the operator and operating system as potential adversaries. A stumbling block has always been that memory addresses are data and good encryption means the encrypted value varies randomly, and that makes hitting any target in memory problematic without address decryption, yet decryption anywhere on the memory path would open up many easily exploitable vulnerabilities. This paper `solves (chaotic) compilation' for processors without address decryption, covering all of ANSI C while satisfying the required security properties and opening up the field for the standard software tool-chain and infrastructure. That produces the argument referred to above, which may also hold without encryption.

READ FULL TEXT
research
04/20/2019

Compiling for Encrypted Computing: Obfuscation but Not in Name

Encrypted computing is the emerging science and technology of processors...
research
11/29/2018

(Un)Encrypted Computing and Indistinguishability Obfuscation

This paper first describes an `obfuscating' compiler technology develope...
research
08/01/2020

CROSSLINE: Breaking ”Security-by-Crash” based Memory Isolation in AMD SEV

AMD's Secure Encrypted Virtualization (SEV) is an emerging security feat...
research
01/30/2019

Safe Compilation for Hidden Deterministic Hardware Aliasing and Encrypted Computing

Hardware aliasing occurs when the same logical address sporadically acce...
research
02/16/2019

Compiled Obfuscation for Data Structures in Encrypted Computing

Encrypted computing is an emerging technology based on a processor that ...
research
03/16/2022

Encrypted Operator Computing: an alternative to Fully Homomorphic Encryption

We introduce a new approach to computation on encrypted data – Encrypted...
research
03/23/2023

Optimal Security Parameter for Encrypted Control Systems Against Eavesdropper and Malicious Server

A sample identifying complexity and a sample deciphering time have been ...

Please sign up or login with your details

Forgot password? Click here to reset