Implementing conjunction obfuscation under entropic ring LWE
We address the practicality challenges of secure program obfuscation by implementing,
optimizing, and experimentally assessing an approach to securely obfuscate conjunction …
optimizing, and experimentally assessing an approach to securely obfuscate conjunction …
When are opaque predicates useful?
L Zobernig, SD Galbraith… - 2019 18th IEEE …, 2019 - ieeexplore.ieee.org
Opaque predicates are a commonly used technique in program obfuscation, intended to add
complexity to control flow and to insert dummy code or watermarks. However, there are …
complexity to control flow and to insert dummy code or watermarks. However, there are …
Innovation corps for learning: Evidence-based entrepreneurship™ to improve (STEM) education
RCC Guerra, KA Smith, AF McKenna… - 2014 IEEE frontiers …, 2014 - ieeexplore.ieee.org
The Innovation Corps for Learning (I-Corps-L) is a pilot initiative from the National Science
Foundation (NSF) and the American Society for Engineering Education (ASEE) to study …
Foundation (NSF) and the American Society for Engineering Education (ASEE) to study …
Practical implementation of lattice-based program obfuscators for point functions
L Bahler, G Di Crescenzo, Y Polyakov… - … Conference on High …, 2017 - ieeexplore.ieee.org
Lattice-based cryptography has recently produced several time-efficient cryptosystems that
are provably secure under assumptions that are not known to be more easily solvable by …
are provably secure under assumptions that are not known to be more easily solvable by …
Boolean circuit camouflage: Cryptographic models, limitations, provable results and a random oracle realization
Recent hardware advances, called gate camouflaging, have opened the possibility of
protecting integrated circuits against reverse-engineering attacks. In this paper, we …
protecting integrated circuits against reverse-engineering attacks. In this paper, we …
[PDF][PDF] Mathematical aspects of program obfuscation
L Zobernig - 2020 - researchspace.auckland.ac.nz
Program obfuscation is an active and heavily researched topic in theoretical and applied
cryptography. General purpose program obfuscators would revolutionise the field and make …
cryptography. General purpose program obfuscators would revolutionise the field and make …
Cryptographic formula obfuscation
G Di Crescenzo - International Symposium on Foundations and Practice …, 2018 - Springer
Under intractability assumptions commonly used in cryptography, we show an efficient
program obfuscator for large classes of programs, including any arbitrary monotone formula …
program obfuscator for large classes of programs, including any arbitrary monotone formula …
Cryptographic program obfuscation: Practical solutions and application-driven models
GD Crescenzo - Versatile Cybersecurity, 2018 - Springer
Program obfuscation is about modifying source or machine code into functionally equivalent
code that is hard to understand to a human or some other program. Early obfuscation …
code that is hard to understand to a human or some other program. Early obfuscation …
Intrusion-resilient classifier approximation: from wildcard matching to range membership
G Di Crescenzo, L Bahler, B Coan… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
We study the problem of securing machine learning classifiers against intrusion attacks (ie,
attacks that somehow retrieve the classifier model parameters). We show that efficient …
attacks that somehow retrieve the classifier model parameters). We show that efficient …
Implementing token-based obfuscation under (ring) LWE
Token-based obfuscation (TBO) is an interactive approach to cryptographic program
obfuscation that was proposed by Goldwasser et al.(STOC 2013) as a potentially more …
obfuscation that was proposed by Goldwasser et al.(STOC 2013) as a potentially more …