Obfuscating branch decisions based on encrypted data using MISR and hash digests

Nektarios Georgios Tsoutsos, Michail Maniatakos

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

In this work, we present a novel obfuscation technique that addresses the problem of information leakage in programs with branch decisions based on encrypted data. Our observation is that we can obfuscate individual branch decisions by non-deterministically evaluating all possible execution paths, before 'lazily' resolving a digest of the intended branch sequence. We are exploring the effectiveness of signature- and hash-based message digests that are hard to invert and disconnect the branch decisions and the controlling values. Our approach is showcased using a single instruction abstract machine, which is Turing complete and supports branching over encrypted data.

Original languageEnglish (US)
Title of host publicationProceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages115-120
Number of pages6
ISBN (Electronic)9781538614211
DOIs
StatePublished - Jul 2 2017
Event2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017 - Beijing, China
Duration: Oct 19 2017Oct 20 2017

Publication series

NameProceedings of the 2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017
Volume2018-May

Other

Other2017 Asian Hardware Oriented Security and Trust Symposium, AsianHOST 2017
Country/TerritoryChina
CityBeijing
Period10/19/1710/20/17

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Obfuscating branch decisions based on encrypted data using MISR and hash digests'. Together they form a unique fingerprint.

Cite this