Compiled Obfuscation for Data Structures in Encrypted Computing

02/16/2019
by   Peter T. Breuer, et al.
0

Encrypted computing is an emerging technology based on a processor that `works encrypted', taking encrypted inputs to encrypted outputs while data remains in encrypted form throughout. It aims to secure user data against possible insider attacks by the operator and operating system (who do not know the user's encryption key and cannot access it in the processor). Formally `obfuscating' compilation for encrypted computing is such that on each recompilation of the source code, machine code of the same structure is emitted for which runtime traces also all have the same structure but each word beneath the encryption differs from nominal with maximal possible entropy across recompilations. That generates classic cryptographic semantic security for data, relative to the security of the encryption, but it guarantees only single words and an adversary has more than that on which to base decryption attempts. This paper extends the existing integer-based technology to doubles, floats, arrays, structs and unions as data structures, covering ANSI C. A single principle drives compiler design and improves the existing security theory to quantitative results: every arithmetic instruction that writes must vary to the maximal extent possible.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/27/2021

An Obfuscating C Compiler for Encrypted Computing

This paper describes an `obfuscating' C compiler for encrypted computing...
research
11/29/2018

(Un)Encrypted Computing and Indistinguishability Obfuscation

This paper first describes an `obfuscating' compiler technology develope...
research
08/29/2019

How Much Does GenoGuard Really "Guard"? An Empirical Analysis of Long-Term Security for Genomic Data

Due to its hereditary nature, genomic data is not only linked to its own...
research
04/20/2019

Compiling for Encrypted Computing: Obfuscation but Not in Name

Encrypted computing is the emerging science and technology of processors...
research
07/20/2023

Threshold Encrypted Mempools: Limitations and Considerations

Encrypted mempools are a class of solutions aimed at preventing or reduc...
research
04/20/2019

Chaotic Compilation for Encrypted Computing: Obfuscation but Not in Name

An `obfuscation' for encrypted computing is quantified exactly here, lea...
research
09/07/2018

Protection of Information from Imitation on the Basis of Crypt-Code Structures

A system is offered for imitation resistant transmitting of encrypted in...

Please sign up or login with your details

Forgot password? Click here to reset