Filters








2,283 Hits in 4.4 sec

Indistinguishability Obfuscation: From Approximate to Exact [chapter]

Nir Bitansky, Vinod Vaikuntanathan
<span title="2015-12-19">2015</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We show general transformations from subexponentially-secure approximate indistinguishability obfuscation (IO) where the obfuscated circuit agrees with the original circuit on a 1/2 + fraction of inputs  ...  As a step towards our results, which is of independent interest, we also obtain an approximate-to-exact transformation for functional encryption.  ...  This motivates us to ask: Can approximate indistinguishability obfuscation be made exact?  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-49096-9_4">doi:10.1007/978-3-662-49096-9_4</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/kwblzro4bnhdbdwb6zvrhp4cye">fatcat:kwblzro4bnhdbdwb6zvrhp4cye</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160309174642/http://eprint.iacr.org/2015/704.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/39/99/3999f590d3f75ad2af83082cdd6cd812c5f97128.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-49096-9_4"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Indistinguishability Obfuscation from Well-Founded Assumptions [article]

Aayush Jain and Huijia Lin and Amit Sahai
<span title="2020-08-21">2020</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
In this work, we show how to construct indistinguishability obfuscation from subexponential hardness of four well-founded assumptions.  ...  obfuscation for all polynomial-size circuits exists.  ...  SD(H 2 , H 3 ) = 1 2 · (I,φ, Bootstrapping to Indistinguishability Obfuscation We now describe a pathway to iO and FE for all circuits. From Structured-Seed PRG to Perturbation Resilient Generator.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2008.09317v1">arXiv:2008.09317v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/pbjc6znheva4zmegijiciar6ay">fatcat:pbjc6znheva4zmegijiciar6ay</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20201011040127/https://arxiv.org/pdf/2008.09317v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/2008.09317v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Lower Bounds on Assumptions Behind Indistinguishability Obfuscation [chapter]

Mohammad Mahmoody, Ameer Mohammed, Soheil Nematihaji, Rafael Pass, Abhi Shelat
<span title="2015-12-19">2015</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
(FOCS'13) in which they proposed the first candidate construction for indistinguishability obfuscation (iO for short), iO has become a central cryptographic primitive with numerous applications.  ...  Our lower bound extends to (separate iO from) any primitive implied by a random oracle in a black-box way. 2.  ...  Indistinguishability Obfuscation Definition 2.4 ([BGI + 01]).  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-49096-9_3">doi:10.1007/978-3-662-49096-9_3</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/zmdkbhfxardzxboktbgrs2lv7q">fatcat:zmdkbhfxardzxboktbgrs2lv7q</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190223203924/http://pdfs.semanticscholar.org/4ce3/85f19b2e5540300ed882ab772a0a415d657d.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/4c/e3/4ce385f19b2e5540300ed882ab772a0a415d657d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-49096-9_3"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation

Dan Boneh, Mark Zhandry
<span title="2016-11-15">2016</span> <i title="Springer Nature"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/qhi3z76be5c5xeihac5cyiid3m" style="color: black;">Algorithmica</a> </i> &nbsp;
In subsequent work, Sahai and Waters [SW13] showed that indistinguishability obfuscation is a powerful cryptographic primitive: it can be used to build public-key encryption from pseudorandom functions  ...  In this work, we show how to use indistinguishability obfuscation (iO) to build multiparty key exchange, efficient broadcast encryption, and efficient traitor tracing.  ...  Acknowledgments We thank Jonathan Ullman for his comments on the connection to differential privacy.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00453-016-0242-8">doi:10.1007/s00453-016-0242-8</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/rkwrtoma7nbehl4b23wztuq3vu">fatcat:rkwrtoma7nbehl4b23wztuq3vu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829023324/https://eprint.iacr.org/2013/642.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/41/a1/41a12043a87298593e3bf6a1b97b98468aad0c73.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/s00453-016-0242-8"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources [chapter]

Christina Brzuska, Pooya Farshim, Arno Mittelbach
<span title="">2014</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
We extend our attack to show that indistinguishability obfuscation is sufficient to also break the UCE security of any hash function against bounded parallel sources.  ...  They facilitate the security proofs of an impressive number of practical cryptosystems ranging from KDM-secure and deterministic encryption to point-function obfuscation and many more.  ...  Indistinguishability obfuscation.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-44371-2_11">doi:10.1007/978-3-662-44371-2_11</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/r3cxk4frozaodgqx3mkw4r7lsy">fatcat:r3cxk4frozaodgqx3mkw4r7lsy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20150318072208/http://eprint.iacr.org/2014/099.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b9/ba/b9ba82ec2a6acf29470f51e5b3981f4b597caa9d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-44371-2_11"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation [chapter]

Dan Boneh, Mark Zhandry
<span title="">2014</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
In subsequent work, Sahai and Waters [SW13] showed that indistinguishability obfuscation is a powerful cryptographic primitive: it can be used to build public-key encryption from pseudorandom functions  ...  In this work, we show how to use indistinguishability obfuscation (iO) to build multiparty key exchange, efficient broadcast encryption, and efficient traitor tracing.  ...  Acknowledgments We thank Jonathan Ullman for his comments on the connection to differential privacy.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-44371-2_27">doi:10.1007/978-3-662-44371-2_27</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/3cz3xxubczc53kvim4j3e5mffy">fatcat:3cz3xxubczc53kvim4j3e5mffy</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20170829023324/https://eprint.iacr.org/2013/642.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/41/a1/41a12043a87298593e3bf6a1b97b98468aad0c73.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-44371-2_27"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption [chapter]

Prabhanjan Ananth, Aayush Jain, Moni Naor, Amit Sahai, Eylon Yogev
<span title="">2016</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Combiners are especially important for a primitive where there are several competing constructions whose security is hard to evaluate, as is the case for indistinguishability obfuscation (IO) and witness  ...  In a recent paper, Goldwasser and Kalai posed as a challenge finding universal constructions for indistinguishability obfuscation and witness encryption.  ...  Acknowledgements We thank Yuval Ishai for helpful discussions and for bringing to our notice the problem of universal obfuscation.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53008-5_17">doi:10.1007/978-3-662-53008-5_17</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/hodmwzkxl5g47esxgmjuipxzza">fatcat:hodmwzkxl5g47esxgmjuipxzza</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20160909041838/http://eprint.iacr.org/2016/281.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/96/28/962857135d73f89742aa0fd50ba04211fec05477.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-662-53008-5_17"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Indistinguishable regions in geographic privacy

Jorge Cuellar, Martín Ochoa, Ruben Rios
<span title="">2012</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/uo6yx5jpgnf2zl7mkrumytd4ti" style="color: black;">Proceedings of the 27th Annual ACM Symposium on Applied Computing - SAC &#39;12</a> </i> &nbsp;
This paper discusses different location-privacy problems, their formalization and the novel notion of indistinguishability regions that allows one to proof that a given obfuscation function provides a  ...  concerns about how much information should be shared about their exact position.  ...  . , t 3 ), the adversary will eventually obtain the exact or a very good approximation of the actual location by intersecting the reported regions.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2245276.2232010">doi:10.1145/2245276.2232010</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/sac/CuellarOR12.html">dblp:conf/sac/CuellarOR12</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ytihnt7q6rasjiiog2lfi7y5sa">fatcat:ytihnt7q6rasjiiog2lfi7y5sa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200320155539/https://www.nics.uma.es/sites/default/files/papers/Cuellar2012_0.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/13/31/133100afb3fd67961e83aa001818f7f679b0626a.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2245276.2232010"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Obfuscation of Hyperplane Membership [chapter]

Ran Canetti, Guy N. Rothblum, Mayank Varia
<span title="">2010</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Finally, we show a cryptographic application of the new obfuscator to digital signatures.  ...  Previous work on program obfuscation gives strong negative results for general-purpose obfuscators, and positive results for obfuscating simple functions such as equality testing (point functions).  ...  The authors would like to thank the anonymous referees for their helpful feedback.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-11799-2_5">doi:10.1007/978-3-642-11799-2_5</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/dkgqfluipzhidctzssn4rzzowa">fatcat:dkgqfluipzhidctzssn4rzzowa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20180729183411/https://link.springer.com/content/pdf/10.1007%2F978-3-642-11799-2_5.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/34/81/34817d33715488116dd9a3915801202b16351c26.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-11799-2_5"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Optimal Geo-Indistinguishable Mechanisms for Location Privacy

Nicolás E. Bordenabe, Konstantinos Chatzikokolakis, Catuscia Palamidessi
<span title="">2014</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS &#39;14</a> </i> &nbsp;
We consider the geo-indistinguishability approach to location privacy, and the trade-off with respect to utility.  ...  Furthermore, we propose a method to reduce the number of constraints of the linear program from cubic to quadratic, maintaining the privacy guarantees and without affecting significantly the utility of  ...  Unless the noise is huge, reporting an obfuscated location will allow the exact location to be inferred, but this is unavoidable. 1 .  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2660267.2660345">doi:10.1145/2660267.2660345</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/BordenabeCP14.html">dblp:conf/ccs/BordenabeCP14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/z34hpihhezdw3mqcngxagkc6lm">fatcat:z34hpihhezdw3mqcngxagkc6lm</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20190218001446/https://static.aminer.org/pdf/20170130/pdfs/ccs/xkdlyutps1uv7qy4fcgxzmwejd2nwrh3.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/f0/54/f0542fbcce36f7599bc5242c81c542a37dc0de6d.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2660267.2660345"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

On obfuscating point functions

Hoeteck Wee
<span title="">2005</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/jlc5kugafjg4dl7ozagimqfcbm" style="color: black;">Proceedings of the thirty-seventh annual ACM symposium on Theory of computing - STOC &#39;05</a> </i> &nbsp;
Our obfuscator is based on a probabilistic hash function constructed from a very strong one-way permutation, and does not require any set-up assumptions.  ...  We stress that prior to this work, what is known about obfuscation are negative results for the general class of circuits [BGI+01] and positive results in the random oracle model [LPS04] or under non-standard  ...  of this research, and to Amit Sahai, Salil Vadhan and an anonymous referee for their insightful and constructive feedback on this work.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1060590.1060669">doi:10.1145/1060590.1060669</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/stoc/Wee05.html">dblp:conf/stoc/Wee05</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/iy6jr5ap7bhsfgahlqymhxf5xu">fatcat:iy6jr5ap7bhsfgahlqymhxf5xu</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20051125120521/http://eprint.iacr.org:80/2005/001.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/72/5a/725a65a236a4772d273b58c6aa58ee9c1d92c4e2.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/1060590.1060669"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

On the Anonymization of Differentially Private Location Obfuscation [article]

Yusuke Kawamoto, Takao Murakami
<span title="2018-07-23">2018</span> <i > arXiv </i> &nbsp; <span class="release-stage" >pre-print</span>
Then we show that the location data obfuscated by the optimal geo-indistinguishable mechanism can be anonymized by removing a smaller number of users from the database.  ...  To formalize and analyze such approximate anonymity we introduce the notion of asymptotic anonymity.  ...  the exact location x hidden from the provider.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1807.08456v1">arXiv:1807.08456v1</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/ak6pj3f6xrb7ll3nf4cyccx3ae">fatcat:ak6pj3f6xrb7ll3nf4cyccx3ae</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20200826011250/https://arxiv.org/pdf/1807.08456v1.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/32/4b/324bd8936227c2c71f65898e70a89ce4996e160c.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener" href="https://arxiv.org/abs/1807.08456v1" title="arxiv.org access"> <button class="ui compact blue labeled icon button serp-button"> <i class="file alternate outline icon"></i> arxiv.org </button> </a>

Obfuscation Revealed: Leveraging Electromagnetic Signals for Obfuscated Malware Classification

Duy-Phuc Pham, Damien Marion, Matthieu Mastio, Annelie Heuser
<span title="2021-12-06">2021</span> <i title="ACM"> Annual Computer Security Applications Conference </i> &nbsp;
Even more, our results show that we are able to classify altered malware samples with unseen obfuscation techniques during the training phase, and to determine what kind of obfuscations were applied to  ...  Using our approach, a malware analyst is able to obtain precise knowledge about malware type and identity, even in the presence of obfuscation techniques which may prevent static or symbolic binary analysis  ...  One way to prevent these artifacts is to patch the exploitable components of the virtual system such that these are indistinguishable from a real machine.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3485832.3485894">doi:10.1145/3485832.3485894</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/tqzl6tvwffdvxftflyzzdcyp3u">fatcat:tqzl6tvwffdvxftflyzzdcyp3u</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20220110142752/https://hal.archives-ouvertes.fr/hal-03374399/file/ACSAC21_camera_ready.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/b4/05/b405065b254706c4ee3d7360da02ca2228bf20a8.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/3485832.3485894"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>

Non-malleable Obfuscation [chapter]

Ran Canetti, Mayank Varia
<span title="">2009</span> <i title="Springer Berlin Heidelberg"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/2w3awgokqne6te4nvlofavy5a4" style="color: black;">Lecture Notes in Computer Science</a> </i> &nbsp;
Existing definitions of program obfuscation do not rule out malleability attacks, where an adversary that sees an obfuscated program is able to generate another (potentially obfuscated) program that is  ...  related to the original one in some way.  ...  Approximate functionality only guarantees that an obfuscated program O(C, r) is "close" in functionality to C.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-00457-5_6">doi:10.1007/978-3-642-00457-5_6</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/h4asirykj5cfbovnqvxafo7tpi">fatcat:h4asirykj5cfbovnqvxafo7tpi</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20120507225847/http://eprint.iacr.org/2008/495.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/6b/60/6b6009833af96e7c74c5f67a7d13ac1357b52cc9.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1007/978-3-642-00457-5_6"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> springer.com </button> </a>

Optimizing Obfuscation

Prabhanjan Ananth, Divya Gupta, Yuval Ishai, Amit Sahai
<span title="">2014</span> <i title="ACM Press"> <a target="_blank" rel="noopener" href="https://fatcat.wiki/container/rau5643b7ncwvh74y6p64hntle" style="color: black;">Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS &#39;14</a> </i> &nbsp;
We focus on the problem of optimizing the obfuscation of Boolean formulas and branching programs -this corresponds to optimizing the "core obfuscator" from the work of Garg, Gentry, Halevi, Raykova, Sahai  ...  This core obfuscator builds upon approximate multilinear maps, where efficiency in proposed instantiations is closely tied to the maximum number of "levels" of multilinearity required.  ...  We are especially grateful to Ilan Komargodski for bringing the work of [31] to our attention as well as for several other helpful suggestions and comments.  ... 
<span class="external-identifiers"> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2660267.2660342">doi:10.1145/2660267.2660342</a> <a target="_blank" rel="external noopener" href="https://dblp.org/rec/conf/ccs/AnanthGIS14.html">dblp:conf/ccs/AnanthGIS14</a> <a target="_blank" rel="external noopener" href="https://fatcat.wiki/release/4krz5gccyfcsbh7yk5safeyyxa">fatcat:4krz5gccyfcsbh7yk5safeyyxa</a> </span>
<a target="_blank" rel="noopener" href="https://web.archive.org/web/20151022132646/http://eprint.iacr.org/2014/222.pdf" title="fulltext PDF download" data-goatcounter-click="serp-fulltext" data-goatcounter-title="serp-fulltext"> <button class="ui simple right pointing dropdown compact black labeled icon button serp-button"> <i class="icon ia-icon"></i> Web Archive [PDF] <div class="menu fulltext-thumbnail"> <img src="https://blobs.fatcat.wiki/thumbnail/pdf/c7/90/c790b56e79a004b1a534f8cd3e0d69bd08255501.180px.jpg" alt="fulltext thumbnail" loading="lazy"> </div> </button> </a> <a target="_blank" rel="external noopener noreferrer" href="https://doi.org/10.1145/2660267.2660342"> <button class="ui left aligned compact blue labeled icon button serp-button"> <i class="external alternate icon"></i> acm.org </button> </a>
&laquo; Previous Showing results 1 &mdash; 15 out of 2,283 results