Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
news
Free access

Researchers probe security through obscurity

Published: 01 August 2014 Publication History

Abstract

Obfuscation protects code by making it so impenetrable that access to it won't help a hacker understand how it works.

References

[1]
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S., Yang, K. On the (Im)possibility of Obfuscating Programs, Advances in Cryptology (2001) 2010 revision: http://www.wisdom. weizmann.ac.il/~oded/PS/obf4.pdf
[2]
Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B. Candidate Indistinguishability Obfuscation and Functional Encryption for all circuits, 54th Annual Symposium on Foundations of Computer Science (FOCS), (2013).
[3]
Sahai, A., Waters, B. How to Use Indistinguishability Obfuscation: Deniable Encryption, and More, IACR Cryptology ePrint Archive 2013: 454 (2013) http://eprint.iacr.org/2013/454
[4]
Barak, B., Bitansky, N., Canetti, R., Kalai, Y.T., Paneth, O., Sahai, A. Obfuscation for Evasive Functions, Theory of Cryptography, Lecture Notes in Computer Science, Volume 8349, pp. 26-51 (2014).
[5]
Gentry, C., Lewko, A., Sahai, A., Waters, B. Indistinguishability Obfuscation from the Multilinear Subgroup Elimination Assumption, IACR Cryptology ePrint Archive 2014: 309 (2014) http://eprint.iacr. org/2014/309

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 57, Issue 8
August 2014
92 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/2632661
  • Editor:
  • Moshe Y. Vardi
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 2014
Published in CACM Volume 57, Issue 8

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • News
  • Popular
  • Pre-selected

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)86
  • Downloads (Last 6 weeks)24
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2021)A Proposed Software Protection Mechanism for Autonomous Vehicular Cloud Computing2021 IEEE International Midwest Symposium on Circuits and Systems (MWSCAS)10.1109/MWSCAS47672.2021.9531682(878-881)Online publication date: 9-Aug-2021
  • (2019)ANCHORACM Transactions on Privacy and Security10.1145/330130522:2(1-36)Online publication date: 26-Feb-2019
  • (2016)CURE-Towards enforcing a reliable timeline for cloud forensicsComputer Communications10.1016/j.comcom.2016.03.02491:C(29-43)Online publication date: 1-Oct-2016
  • (2015)Control use of data to protect privacyScience10.1126/science.aaa4961347:6221(504-506)Online publication date: 29-Jan-2015
  • (2015)Diversified Remote Code Execution Using Dynamic Obfuscation of Conditional BranchesProceedings of the 2015 IEEE 35th International Conference on Distributed Computing Systems Workshops10.1109/ICDCSW.2015.37(120-127)Online publication date: 29-Jun-2015

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media