Obfuscating branch decisions based on encrypted data using MISR and hash digests

Nektarios Georgios Tsoutsos, Mihalis Maniatakos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this work, we present a novel obfuscation technique that addresses the problem of information leakage in programs with branch decisions based on encrypted data. Our observation is that we can obfuscate individual branch decisions by non-deterministically evaluating all possible execution paths, before 'lazily' resolving a digest of the intended branch sequence. We are exploring the effectiveness of signature- and hash-based message digests that are hard to invert and disconnect the branch decisions and the controlling values. Our approach is showcased using a single instruction abstract machine, which is Turing complete and supports branching over encrypted data.

Original languageEnglish (US)
Title of host publicationProceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages115-120
Number of pages6
Volume2018-May
ISBN (Electronic)9781538614211
DOIs
StatePublished - May 3 2018
Event2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017 - Beijing, China
Duration: Oct 19 2017Oct 20 2017

Other

Other2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017
CountryChina
CityBeijing
Period10/19/1710/20/17

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Hardware and Architecture
  • Safety, Risk, Reliability and Quality

Cite this

Tsoutsos, N. G., & Maniatakos, M. (2018). Obfuscating branch decisions based on encrypted data using MISR and hash digests. In Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017 (Vol. 2018-May, pp. 115-120). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/AsianHOST.2017.8354005

Obfuscating branch decisions based on encrypted data using MISR and hash digests. / Tsoutsos, Nektarios Georgios; Maniatakos, Mihalis.

Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017. Vol. 2018-May Institute of Electrical and Electronics Engineers Inc., 2018. p. 115-120.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tsoutsos, NG & Maniatakos, M 2018, Obfuscating branch decisions based on encrypted data using MISR and hash digests. in Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017. vol. 2018-May, Institute of Electrical and Electronics Engineers Inc., pp. 115-120, 2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017, Beijing, China, 10/19/17. https://doi.org/10.1109/AsianHOST.2017.8354005
Tsoutsos NG, Maniatakos M. Obfuscating branch decisions based on encrypted data using MISR and hash digests. In Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017. Vol. 2018-May. Institute of Electrical and Electronics Engineers Inc. 2018. p. 115-120 https://doi.org/10.1109/AsianHOST.2017.8354005
Tsoutsos, Nektarios Georgios ; Maniatakos, Mihalis. / Obfuscating branch decisions based on encrypted data using MISR and hash digests. Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017. Vol. 2018-May Institute of Electrical and Electronics Engineers Inc., 2018. pp. 115-120
@inproceedings{b2aaa9a35930472faa5bc3b2dd9f668a,
title = "Obfuscating branch decisions based on encrypted data using MISR and hash digests",
abstract = "In this work, we present a novel obfuscation technique that addresses the problem of information leakage in programs with branch decisions based on encrypted data. Our observation is that we can obfuscate individual branch decisions by non-deterministically evaluating all possible execution paths, before 'lazily' resolving a digest of the intended branch sequence. We are exploring the effectiveness of signature- and hash-based message digests that are hard to invert and disconnect the branch decisions and the controlling values. Our approach is showcased using a single instruction abstract machine, which is Turing complete and supports branching over encrypted data.",
author = "Tsoutsos, {Nektarios Georgios} and Mihalis Maniatakos",
year = "2018",
month = "5",
day = "3",
doi = "10.1109/AsianHOST.2017.8354005",
language = "English (US)",
volume = "2018-May",
pages = "115--120",
booktitle = "Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Obfuscating branch decisions based on encrypted data using MISR and hash digests

AU - Tsoutsos, Nektarios Georgios

AU - Maniatakos, Mihalis

PY - 2018/5/3

Y1 - 2018/5/3

N2 - In this work, we present a novel obfuscation technique that addresses the problem of information leakage in programs with branch decisions based on encrypted data. Our observation is that we can obfuscate individual branch decisions by non-deterministically evaluating all possible execution paths, before 'lazily' resolving a digest of the intended branch sequence. We are exploring the effectiveness of signature- and hash-based message digests that are hard to invert and disconnect the branch decisions and the controlling values. Our approach is showcased using a single instruction abstract machine, which is Turing complete and supports branching over encrypted data.

AB - In this work, we present a novel obfuscation technique that addresses the problem of information leakage in programs with branch decisions based on encrypted data. Our observation is that we can obfuscate individual branch decisions by non-deterministically evaluating all possible execution paths, before 'lazily' resolving a digest of the intended branch sequence. We are exploring the effectiveness of signature- and hash-based message digests that are hard to invert and disconnect the branch decisions and the controlling values. Our approach is showcased using a single instruction abstract machine, which is Turing complete and supports branching over encrypted data.

UR - http://www.scopus.com/inward/record.url?scp=85050940165&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=85050940165&partnerID=8YFLogxK

U2 - 10.1109/AsianHOST.2017.8354005

DO - 10.1109/AsianHOST.2017.8354005

M3 - Conference contribution

AN - SCOPUS:85050940165

VL - 2018-May

SP - 115

EP - 120

BT - Proceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017

PB - Institute of Electrical and Electronics Engineers Inc.

ER -