Questions tagged [obfuscation]

Obfuscation is the process by which the code is altered so that a developer finds it much harder to understand clearly what the intended program does or how it operates. The larger the program the greater the obfuscation, as code becomes intertwined linking different segments through out the program.

While it may be possible to use a disassembler to figure out how certain aspects within a program function, it requires knowledge of assembly. Assembly language by its nature is non-trivial.

Another way to increase obfuscation is to use packers.

16 questions
10
votes
1 answer

How inefficient are current Indistinguishability Obfuscation (IO) candidates?

Since last year, IO finally seems to be within our reach. Several papers (https://eprint.iacr.org/2020/1003, https://eprint.iacr.org/2020/1024 and https://eprint.iacr.org/2020/1042) proved the existence of IO based on almost-standard…
CryptoPerson
  • 121
  • 4
4
votes
1 answer

Virtual Black Box Obfuscator

For which class of circuits does the Virtual black box(VBB) obfuscator exists? If so Why? What are the attempts/further developments made in this topic?
4
votes
1 answer

How to explain indistinguishability obfuscation (iO) to my grandmother?

At the risk of oversimplification, how do I explain indistinguishability obfuscation (iO) to my grandmother?
Nathan Aw
  • 2,177
  • 3
  • 14
  • 20
4
votes
2 answers

What is Black-Box Obfuscation?

I understand black-box obfuscation at some intuitive level as- "an adversary can learn nothing more from an obfuscated program/circuit/function than he or she can from a black-box access to the same program/circuit/function." But I am failing at…
DaveIdito
  • 143
  • 3
4
votes
2 answers

Randomized encodings and Indistinguishability obfuscation

I want to understand the difference between randomized encodings and indistinguishability obfuscation (iO). Are randomized encodings a special type of iO?
BlackHat18
  • 337
  • 1
  • 8
3
votes
1 answer

Quantum-secure obfuscation

My question is a follow-up to a recent question regarding quantum-secure time-lock puzzles (TLPs). TLPs can be built (in principle) from indistinguishability obfuscation (iO) [BGJ+,BGL+] as noted in this thread. As a corollary, quantum-secure iO…
ckamath
  • 4,973
  • 2
  • 20
  • 41
1
vote
1 answer

What's the difference between VBB and iO?

What's the difference between the definitions of virtual black-box (VBB) obfuscation and indistinguishability obfuscation (iO)? Is there any presentation describing both? Furthermore, why is the notion of iO interesting (and sufficient in practical…
user4936
1
vote
0 answers

Distributional Virtual Black Box security

Can anyone clearly explain the difference between these two notions of obfuscation security: VBB security and D-VBB Security. VBB Security: An obfuscated program is no better than just a black box access to the program D-VBB Security : Let $D =…
Vshi
  • 31
  • 1
1
vote
0 answers

Cryptographic Code Anonymization

I've been reading a lot about techniques related to stylometry whereby programmers can be de-anonymized by analyzing their source code. Resisting deanonymization seems like a multifaceted problem. From variable renaming, space generation etc... to…
1
vote
1 answer

Personal ledgible quick cipher

The problem: When I'm writing or reading information (be it on a screen or a physical medium) the information is vulnerable. So long as I'm not alone, anyone can simply glance at my screen or journal and instantly read what's written there (like…
Dragongeek
  • 111
  • 3
1
vote
1 answer

Indistinguishability obfuscation and PRFs

Consider a family of pseudorandom functions $F$, each member $f_k$ of this family is indexed by a key $k$. It is true, due to a result by Barak et al, that black box obfuscation is not possible for a generic family of this type. However, is it…
0
votes
1 answer

Efficient Obfuscation or Encryption method with low memory usage

We are manufacturing a sensor which transmits in 8 byte packets. This sensor will be used by several different receivers, some of which have very little spare RAM available (< 3 kb). On some of the receivers we will provide the software, in other…
Disco Stu
  • 103
  • 1
0
votes
1 answer

How can a learnable function be obfuscable?

I overheard in a lecture on cryptographic obfuscation that the learnable functions are obfuscable. But to me this seems so counter-intuitive. Let's take a linear function (as an example of learnable function), then say I am given any obfuscated…
DaveIdito
  • 143
  • 3
0
votes
0 answers

Decrypting an AES string

I'm dealing with a website that loads a javascript file which eventually sets an AES hash/value (whatever it's called) as a cookie. The file is heavily obfuscated making it hard to understand certain things within. Anyways, I have reversed enough of…
Joe
  • 1
  • 1
0
votes
0 answers

Are there servers that are oblivious to their own output?

Suppose there are $n$ parties with public keys $pk_1,...,pk_n$. Is it possible that a server S constructs an algorithm $A$ so that for some public random nonce $r$ given as input, S computes some "oblivious function" whose output is a tuple of…
1
2