Towards a Theory of Special-purpose Program Obfuscation

11/05/2020
by   Muhammad Rizwan Asghar, et al.
0

Most recent theoretical literature on program obfuscation is based on notions like Virtual Black Box (VBB) obfuscation and indistinguishability Obfuscation (iO). These notions are very strong and are hard to satisfy. Further, they offer far more protection than is typically required in practical applications. On the other hand, the security notions introduced by software security researchers are suitable for practical designs but are not formal or precise enough to enable researchers to provide a quantitative security assurance. Hence, in this paper, we introduce a new formalism for practical program obfuscation that still allows rigorous security proofs. We believe our formalism will make it easier to analyse the security of obfuscation schemes. To show the flexibility and power of our formalism, we give a number of examples. Moreover, we explain the close relationship between our formalism and the task of providing obfuscation challenges. This is the full version of the paper. In this version, we also give a new rigorous analysis of several obfuscation techniques and we provide directions for future research.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/11/2022

Uncloneable Decryptors from Quantum Copy-Protection

Uncloneable decryptors are encryption schemes (with classical plaintexts...
research
09/17/2023

Formalizing two-level type theory with cofibrant exo-nat

This study provides some results about two-level type-theoretic notions ...
research
03/03/2021

Information Security Games: A Survey

We introduce some preliminaries about game theory and information securi...
research
07/02/2021

A Systems Theory of Transfer Learning

Existing frameworks for transfer learning are incomplete from a systems ...
research
10/03/2017

On Secure and Usable Program Obfuscation: A Survey

Program obfuscation is a widely employed approach for software intellect...
research
05/08/2022

Reasoning about inter-procedural security requirements in IoT applications

The importance of information security dramatically increased and will f...
research
11/06/2019

The role of formalism in system requirements (full version)

A major determinant of the quality of software systems is the quality of...

Please sign up or login with your details

Forgot password? Click here to reset