-
41
Investigating representations of obfuscated malicious PowerShell
Published 2019Get full text
Thesis -
42
Matrix PRFs: Constructions, Attacks, and Applications to Obfuscation
Published 2021“…Matrix PRFs are attractive due to their simplicity, strong connections to complexity theory and group theory, and recent applications in program obfuscation. Our main results are:We present constructions of matrix PRFs based on the conjectured hardness of computational problems pertaining to matrix products.We show that any matrix PRF that is computable by a read-c, width w branching program can be broken in time poly this means that any matrix PRF based on constant-width matrices must read each input bit ωc times. …”
Get full text
Book -
43
Structure vs. Hardness Through the Obfuscation Lens
Published 2021“…In fact, we first show that even the very powerful notion of Indistinguishability Obfuscation (IO) does not imply such hard problems, and then deduce the same for a large class of primitives that can be constructed from IO.…”
Get full text
Article -
44
Structure Versus Hardness Through the Obfuscation Lens
Published 2022“…In fact, we first show that even the very powerful notion of indistinguishability obfuscation (IO) does not imply such hard problems, and then deduce the same for a large class of primitives that can be constructed from IO.…”
Get full text
Article -
45
Indistinguishability Obfuscation, Range Avoidance, and Bounded Arithmetic
Published 2023Get full text
Article -
46
-
47
-
48
Software code protection through software obfuscation
Published 2010“…We also discuss how the novel methods improve the obfuscation efficiency in comparison with the existing competing obfuscation methods.…”
Get full text
Thesis -
49
Obfuscating the topical intention in enterprise text search
Published 2013“…To safeguard the enterprise from consequences arising from a disclosure of the query traces, it is desirable to obfuscate the true user intention from the search engine, without requiring it to be re-engineered. …”
Get full text
Get full text
Conference Paper -
50
On Non-Black-Box Simulation and the Impossibility of Approximate Obfuscation
Published 2016“…(CRYPTO 2001) to the case of obfuscation with approximate functionality, thus settling a question left open by Barak et al. …”
Get full text
Get full text
Article -
51
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator
Published 2021“…In this paper we show that indistinguishability obfuscation for general circuits implies, somewhat counterintuitively, strong impossibility results for virtual black box obfuscation. …”
Get full text
Article -
52
Indistinguishability Obfuscation for RAM Programs and Succinct Randomized Encodings
Published 2021“…The obfuscation process is quasi-linear in the description length of the input program and s(n). …”
Get full text
Article -
53
Limits on the Locality of Pseudorandom Generators and Applications to Indistinguishability Obfuscation
Published 2021“…Lin and Tessaro (ePrint 2017) recently proposed indistinguishability obfuscation (IO) and functional encryption (FE) candidates and proved their security based on two assumptions: a standard assumption on bilinear maps and a non-standard assumption on “Goldreich-like” pseudorandom generators. …”
Get full text
Article -
54
On the Capacity of Scalar Gaussian Channels Subject to State Obfuscation
Published 2024“…The problem of communication over multiple variants of the scalar Gaussian fading channel subject to a state-obfuscation constraint imposed in the form of near independence between the channel outputs and the channel coefficients has been studied. …”
Get full text
Thesis -
55
-
56
Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation
Published 2021“…It requires a global (nonprogrammable) reference string and is based on one way functions and general-purpose indistinguishability obfuscation with sub-exponential security, as well as augmented non-committing encryption. …”
Get full text
Book -
57
Obfuscation and watermarking of FPGA designs based on constant value generators
Published 2015“…Obfuscation is a technique which makes design less intelligible in order to prevent or increase reverse engineering effort. …”
Get full text
Get full text
Get full text
Conference Paper -
58
Lightweight and unobtrusive data obfuscation at IoT edge for remote inference
Published 2023Subjects: Get full text
Journal Article -
59
Graph-based analysis for hardware obfuscation through logic locking
Published 2023“…Investigation into manufactured IC chips and obfuscation on IP designs are two effective approaches to address these concerns. …”
Get full text
Final Year Project (FYP) -
60
Streamlining DNN obfuscation to defend against model stealing attacks
Published 2024“…In this work, we study the impact of various obfuscation levels on the defence effectiveness, and present a streamlined DNN obfuscation process that is extremely fast and is agnostic to any attack models. …”
Get full text
Get full text
Conference Paper