Binary Permutation Polynomial Inversion and Application to Obfuscation Techniques

Abstract : Whether it is for constant obfusation, opaque predicate or equation obfuscation, Mixed Boolean-Arithmetic (MBA) expressions are a powerful tool providing concrete ways to achieve obfuscation. Recent papers [22, 1] presented ways to mix such a tool with permutation polynomials modulo 2 n in order to make the obfuscation technique more resilient to SMT solvers. However, because of limitations regarding the inversion of such permutations, the set of permutation polynomials presented suffers some restrictions. Those restrictions allow several methods of arithmetic simplification, decreasing the effectiveness of the technique at hiding information. In this work, we present general methods for permutation polynomials inversion. These methods allow us to remove some of the restrictions presented in the literature, making simplification attacks less effective. We discuss complexity and limits of these methods, and conclude that not only current simplification attacks may not be as effective as we thought, but they are still many uses of polynomial permutations in obfuscation that are yet to be explored.
Type de document :
Communication dans un congrès
2nd International Workshop on Software PROtection, Oct 2016, Vienna, Austria. ACM, Proceedings of the 2nd International Workshop on Software PROtection, 2016, 〈10.1145/2995306.2995310〉
Liste complète des métadonnées

Littérature citée [21 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/hal-01388108
Contributeur : Lucas Barthelemy <>
Soumis le : mercredi 26 octobre 2016 - 14:56:56
Dernière modification le : mardi 1 mai 2018 - 11:36:01

Fichier

[Final]Submission6.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

Collections

Citation

Lucas Barthelemy, Ninon Eyrolles, Guénaël Renault, Raphaël Roblin. Binary Permutation Polynomial Inversion and Application to Obfuscation Techniques. 2nd International Workshop on Software PROtection, Oct 2016, Vienna, Austria. ACM, Proceedings of the 2nd International Workshop on Software PROtection, 2016, 〈10.1145/2995306.2995310〉. 〈hal-01388108〉

Partager

Métriques

Consultations de la notice

338

Téléchargements de fichiers

242