Binary permutation polynomial inversion and application to obfuscation techniques

  • Lucas Barthelemy
  • , Ninon Eyrolles
  • , Guenaël Renault
  • , Raphaël Roblin

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Whether it is for constant obfusation, opaque predicate or equation obfuscation, Mixed Boolean-Arithmetic (MBA) expressions are a powerful tool providing concrete ways to achieve obfuscation. Recent papers [22, 1] presented ways to mix such a tool with permutation polynomials modulo 2n in order to make the obfuscation technique more resilient to SMT solvers. However, because of limitations regarding the inversion of such permutations, the set of permutation polynomials presented suffers some restrictions. Those restrictions allow several methods of arithmetic simplification, decreasing the effectiveness of the technique at hiding information. In this work, we present general methods for permutation polynomials inversion. These methods allow us to remove some of the restrictions presented in the literature, making simplification attacks less effective. We discuss complexity and limits of these methods, and conclude that not only current simplification attacks may not be as effective as we thought, but they are still many uses of polynomial permutations in obfuscation that are yet to be explored.

Original languageEnglish
Title of host publicationSPRO 2016 - Proceedings of the 2016 ACM Workshop on Software PROtection, co-located with CCS 2016
PublisherAssociation for Computing Machinery, Inc
Pages51-59
Number of pages9
ISBN (Electronic)9781450345767
DOIs
Publication statusPublished - 28 Oct 2016
Externally publishedYes
Event2nd International Workshop on Software PROtection, SPRO 2016 - Vienna, Austria
Duration: 28 Oct 2016 → …

Publication series

NameSPRO 2016 - Proceedings of the 2016 ACM Workshop on Software PROtection, co-located with CCS 2016

Conference

Conference2nd International Workshop on Software PROtection, SPRO 2016
Country/TerritoryAustria
CityVienna
Period28/10/16 → …

Keywords

  • Obfuscation
  • Permutation polynomial

Fingerprint

Dive into the research topics of 'Binary permutation polynomial inversion and application to obfuscation techniques'. Together they form a unique fingerprint.

Cite this