The method of generation program code with indistinguishable functionality
The paper presents an obfuscation problem, in which indistinguishability is considered relatively to programs with distinguishable functionality. The functionality remains undisclosed owing to unknown parameters in the program’s input. An attacker that can run only polynomial time algorithms will no...
Gespeichert in:
Veröffentlicht in: | Bezopasnostʹ informat͡s︡ionnykh tekhnologiĭ 2017-04, Vol.24 (1), p.66-72 |
---|---|
1. Verfasser: | |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The paper presents an obfuscation problem, in which indistinguishability is considered relatively to programs with distinguishable functionality. The functionality remains undisclosed owing to unknown parameters in the program’s input. An attacker that can run only polynomial time algorithms will not be able to distinguish the program’s functionality without having the input key. Thus, it was named a key obfuscator. The article sets a problem of creating key obfuscators and efficient algorithms for their operation. The obfuscator’s general scheme of operation for logic schemes of any functionality is presented. Proof of a theorem is provided, which states that the obfuscator presented is a key obfuscator. The possibility of finding key obfuscator’s efficient operation algorithms for specific applications is established. Key-based obfuscation enables finding solutions for tasks such as open storage and execution of a program code in an untrusted computational environment and makes it more difficult to carry out injection attacks and analysis of distributed computing. Authentication and confirmation of rights for using software can be another application of key obfuscation, because without the key program code is useless. |
---|---|
ISSN: | 2074-7128 2074-7136 |
DOI: | 10.26583/bit.2017.1.08 |