Implementing conjunction obfuscation under entropic ring LWE

DB Cousins, G Di Crescenzo, KD Gür… - … IEEE Symposium on …, 2018 - ieeexplore.ieee.org
We address the practicality challenges of secure program obfuscation by implementing,
optimizing, and experimentally assessing an approach to securely obfuscate conjunction …

When are opaque predicates useful?

L Zobernig, SD Galbraith… - 2019 18th IEEE …, 2019 - ieeexplore.ieee.org
Opaque predicates are a commonly used technique in program obfuscation, intended to add
complexity to control flow and to insert dummy code or watermarks. However, there are …

Innovation corps for learning: Evidence-based entrepreneurship™ to improve (STEM) education

RCC Guerra, KA Smith, AF McKenna… - 2014 IEEE frontiers …, 2014 - ieeexplore.ieee.org
The Innovation Corps for Learning (I-Corps-L) is a pilot initiative from the National Science
Foundation (NSF) and the American Society for Engineering Education (ASEE) to study …

Practical implementation of lattice-based program obfuscators for point functions

L Bahler, G Di Crescenzo, Y Polyakov… - … Conference on High …, 2017 - ieeexplore.ieee.org
Lattice-based cryptography has recently produced several time-efficient cryptosystems that
are provably secure under assumptions that are not known to be more easily solvable by …

Boolean circuit camouflage: Cryptographic models, limitations, provable results and a random oracle realization

G Di Crescenzo, J Rajendran, R Karri… - Proceedings of the 2017 …, 2017 - dl.acm.org
Recent hardware advances, called gate camouflaging, have opened the possibility of
protecting integrated circuits against reverse-engineering attacks. In this paper, we …

[PDF][PDF] Mathematical aspects of program obfuscation

L Zobernig - 2020 - researchspace.auckland.ac.nz
Program obfuscation is an active and heavily researched topic in theoretical and applied
cryptography. General purpose program obfuscators would revolutionise the field and make …

Cryptographic formula obfuscation

G Di Crescenzo - International Symposium on Foundations and Practice …, 2018 - Springer
Under intractability assumptions commonly used in cryptography, we show an efficient
program obfuscator for large classes of programs, including any arbitrary monotone formula …

Cryptographic program obfuscation: Practical solutions and application-driven models

GD Crescenzo - Versatile Cybersecurity, 2018 - Springer
Program obfuscation is about modifying source or machine code into functionally equivalent
code that is hard to understand to a human or some other program. Early obfuscation …

Intrusion-resilient classifier approximation: from wildcard matching to range membership

G Di Crescenzo, L Bahler, B Coan… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
We study the problem of securing machine learning classifiers against intrusion attacks (ie,
attacks that somehow retrieve the classifier model parameters). We show that efficient …

Implementing token-based obfuscation under (ring) LWE

C Chen, N Genise, D Micciancio, Y Polyakov… - Cryptology ePrint …, 2018 - eprint.iacr.org
Token-based obfuscation (TBO) is an interactive approach to cryptographic program
obfuscation that was proposed by Goldwasser et al.(STOC 2013) as a potentially more …