Advanced Search
DSpace@MIT

Studies in program obfuscation

Research and Teaching Output of the MIT Community

Show simple item record

dc.contributor.advisor Ran Canetti. en_US
dc.contributor.author Varia, Mayank (Mayank Harshad) en_US
dc.contributor.other Massachusetts Institute of Technology. Dept. of Mathematics. en_US
dc.date.accessioned 2011-06-20T13:45:44Z
dc.date.available 2011-06-20T13:45:44Z
dc.date.copyright 2010 en_US
dc.date.issued 2010 en_US
dc.identifier.uri http://hdl.handle.net/1721.1/64489
dc.description Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 2010. en_US
dc.description This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. en_US
dc.description Cataloged from student submitted PDF version of thesis. en_US
dc.description Includes bibliographical references (p. 159-164). en_US
dc.description.abstract Program obfuscation is the software analog to the problem of tamper-proofing hardware. The goal of program obfuscation is to construct a compiler, called an "obfuscator," that garbles the code of a computer program while maintaining its functionality. Commercial products exist to perform this procedure, but they do not provide a rigorous security guarantee. Over the past decade, program obfuscation has been studied by the theoretical cryptography community, where rigorous definitions of security have been proposed and obfuscators have been constructed for some families of programs. This thesis presents three contributions based on the virtual black-box security definition of Barak et al [10]. First, we show tight connections between obfuscation and symmetric-key encryption. Specifically, obfuscation can be used to construct an encryption scheme with strong leakage resilience and key-dependent message security. The converse is also true, and these connections scale with the level of security desired. As a result, the known constructions and impossibility results for each primitive carry over to the other. Second, we present two new security definitions that augment the virtual black-box property to incorporate non-malleability. The virtual black-box definition does not prevent an adversary from modifying an obfuscated program intelligently. By contrast, our new definitions provide software with the same security guarantees as tamper-proof and tamper-evident hardware, respectively. The first definition prohibits tampering, and the second definition requires that tampering is detectable after the fact. We construct non-malleable obfuscators of both favors for some program families of interest. Third, we present an obfuscator for programs that test for membership in a hyperplane. This generalizes prior works that obfuscate equality testing. We prove the security of the obfuscator under a new strong variant of the Decisional Diffie-Hellman assumption that holds in the generic group model. Additionally, we show a cryptographic application of the new obfuscator to leak-ageresilient one-time digital signatures. The thesis also includes a survey of the prior results in the field. en_US
dc.description.statementofresponsibility by Mayank Varia. en_US
dc.format.extent 164 p. en_US
dc.language.iso eng en_US
dc.publisher Massachusetts Institute of Technology en_US
dc.rights M.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission. en_US
dc.rights.uri http://dspace.mit.edu/handle/1721.1/7582 en_US
dc.subject Mathematics. en_US
dc.title Studies in program obfuscation en_US
dc.type Thesis en_US
dc.description.degree Ph.D. en_US
dc.contributor.department Massachusetts Institute of Technology. Dept. of Mathematics. en_US
dc.identifier.oclc 727175818 en_US


Files in this item

Name Size Format Description
727175818-MIT.pdf 916.9Kb PDF Full printable version

This item appears in the following Collection(s)

Show simple item record

MIT-Mirage