TY - GEN
T1 - Binary permutation polynomial inversion and application to obfuscation techniques
AU - Barthelemy, Lucas
AU - Eyrolles, Ninon
AU - Renault, Guenaël
AU - Roblin, Raphaël
N1 - Publisher Copyright:
© 2016 Copyright held by the owner/author(s).
PY - 2016/10/28
Y1 - 2016/10/28
N2 - Whether it is for constant obfusation, opaque predicate or equation obfuscation, Mixed Boolean-Arithmetic (MBA) expressions are a powerful tool providing concrete ways to achieve obfuscation. Recent papers [22, 1] presented ways to mix such a tool with permutation polynomials modulo 2n in order to make the obfuscation technique more resilient to SMT solvers. However, because of limitations regarding the inversion of such permutations, the set of permutation polynomials presented suffers some restrictions. Those restrictions allow several methods of arithmetic simplification, decreasing the effectiveness of the technique at hiding information. In this work, we present general methods for permutation polynomials inversion. These methods allow us to remove some of the restrictions presented in the literature, making simplification attacks less effective. We discuss complexity and limits of these methods, and conclude that not only current simplification attacks may not be as effective as we thought, but they are still many uses of polynomial permutations in obfuscation that are yet to be explored.
AB - Whether it is for constant obfusation, opaque predicate or equation obfuscation, Mixed Boolean-Arithmetic (MBA) expressions are a powerful tool providing concrete ways to achieve obfuscation. Recent papers [22, 1] presented ways to mix such a tool with permutation polynomials modulo 2n in order to make the obfuscation technique more resilient to SMT solvers. However, because of limitations regarding the inversion of such permutations, the set of permutation polynomials presented suffers some restrictions. Those restrictions allow several methods of arithmetic simplification, decreasing the effectiveness of the technique at hiding information. In this work, we present general methods for permutation polynomials inversion. These methods allow us to remove some of the restrictions presented in the literature, making simplification attacks less effective. We discuss complexity and limits of these methods, and conclude that not only current simplification attacks may not be as effective as we thought, but they are still many uses of polynomial permutations in obfuscation that are yet to be explored.
KW - Obfuscation
KW - Permutation polynomial
U2 - 10.1145/2995306.2995310
DO - 10.1145/2995306.2995310
M3 - Conference contribution
AN - SCOPUS:85032102021
T3 - SPRO 2016 - Proceedings of the 2016 ACM Workshop on Software PROtection, co-located with CCS 2016
SP - 51
EP - 59
BT - SPRO 2016 - Proceedings of the 2016 ACM Workshop on Software PROtection, co-located with CCS 2016
PB - Association for Computing Machinery, Inc
T2 - 2nd International Workshop on Software PROtection, SPRO 2016
Y2 - 28 October 2016
ER -