Feeds

Protecting code's secrets wins ACM prize

Code obfuscation: a difficult problem apparently cracked

Beginner's guide to SSL certificates

Better code obfuscation has attracted the attention of the prestigious Association of Computing Machinery, which has anointed an Indian-born developer working at IBM's TJ Watson Research Centre with an award for his work.

Protecting code, even as a binary, from being reverse-engineered is difficult: any solution that encrypts the code has to keep its functionality in place, and decrypting the code for execution has to be fast.

Sanjam Garg, an alumni of the Institute of Technology of Delhi, claims to have cracked that problem in this paper, Candidate Multilinear Maps from Ideal Lattices.

As that paper explains, bilinear maps are so well-known that their applications are “too numerous” to list – but (for example) tripartate Diffie-Hellman and identity-based encryption are two handy examples. Expanding that concept to multi-lineal maps has been theorised, Garg writes in his paper, but not previously achieved.

That work was then expanded on in collaboration between Garg and researchers from Microsoft, Boston University and UCLA, here, which demonstrated that Garg's concepts are workable for program obfuscation.

As they put it in the paper's abstract, Garg's work provides a “candidate obfuscator that cannot be broken by algebraic attacks”.

As the ACM notes: “Garg described new mathematical tools that serve as key ingredients for transforming a program into a 'jigsaw puzzle' of encrypted pieces. Corresponding to each input is a unique set of puzzle pieces that, when assembled, reveal the output of the program. Security of the obfuscated program hinges on the fact that illegitimate combinations of the puzzle pieces do not reveal anything.” ®

Internet Security Threat Report 2014

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
Facebook, working on Facebook at Work, works on Facebook. At Work
You don't want your cat or drunk pics at the office
Soz, web devs: Google snatches its Wallet off the table
Killing off web service in 3 months... but app-happy bonkers are fine
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.