CRYPTO OBFUSCATION

New Directions in Cryptographic Program Obfuscation

 Coordinatore  

 Organization address address: RAMAT AVIV
city: TEL AVIV
postcode: 69978

contact info
Titolo: Ms.
Nome: Lea
Cognome: Pais
Email: send email
Telefono: -6407805
Fax: -6408728

 Nazionalità Coordinatore Non specificata
 Totale costo 100˙000 €
 EC contributo 100˙000 €
 Programma FP7-PEOPLE
Specific programme "People" implementing the Seventh Framework Programme of the European Community for research, technological development and demonstration activities (2007 to 2013)
 Code Call FP7-PEOPLE-IRG-2008
 Funding Scheme MC-IRG
 Anno di inizio 2008
 Periodo (anno-mese-giorno) 2008-09-01   -   2012-08-31

 Partecipanti

# participant  country  role  EC contrib. [€] 
1    TEL AVIV UNIVERSITY

 Organization address address: RAMAT AVIV
city: TEL AVIV
postcode: 69978

contact info
Titolo: Ms.
Nome: Lea
Cognome: Pais
Email: send email
Telefono: -6407805
Fax: -6408728

IL (TEL AVIV) coordinator 0.00

Mappa


 Word cloud

Esplora la "nuvola delle parole (Word Cloud) per avere un'idea di massima del progetto.

algorithms    directions    obfuscation    cryptography    programs    provably    ability    obfuscating    notions    inputs    input    output    obfuscated    classes    obfuscators    hard   

 Obiettivo del progetto (Objective)

'Program Obfuscators are algorithms that take as input a program P and output another program that has the same input-output functionality, and at the same time is 'hard to understand'. Ideally, seeing the obfuscated program in full should not give any insight or ability other than the ability to simply run it 'as a black box' on inputs of one's choice. Program obfuscation is a hard task. Indeed, practical experience shows that most, if not all ah-hoc attempts at obfuscating programs eventually fail. Furthermore, theoretical results rule out the existence of algorithms that can obfuscate any program in the above ideal sense. Still, recent results demonstrate that provably secure obfuscators do exist for some simple classes of programs. The proposed research aims to further our understanding of this intriguing concept and its usefulness in cryptography. Some of the proposed directions are: - Expanding the boundaries of what's provably obfuscatable. As first steps, we propose new methodologies for obfuscating richer classes of programs, along with some exciting applications. - Formulating and achieving stronger notions of obfuscation than the currently considered ones. The currently considered notions of obfuscation do not suffice for some prominent applications. The unaddressed concerns include malleability of obfuscated programs, composability, and security for low-entropy inputs. - Finding ways to circumvent the known impossibility results for general-purpose obfuscators. Two directions look promising here: One is to relax the current formulations in a way that preserves the essence of the notion. Alternatively, analyze obfuscators in an abstract models that represent limited adversaries. - Finding new applications of the program obfuscation in other areas in cryptography.'

Altri progetti dello stesso programma (FP7-PEOPLE)

REXPIRE (2011)

RFID EXPERIENCE AND PRIVACY IN THE RETAIL ENVIRONMENT. INDICATIONS FOR IN-STORE CONSUMER RESEARCH

Read More  

GENEDISCREEN (2011)

Identification and screen of RNA Editing in the Human Genome

Read More  

INTEGER (2009)

Integrated approaches to study gene regulation during cellular differentiation

Read More