Categories: Breaking NewsSecurity

DARPA even more interested in software Obfuscation Solutions

DARPA is sustaining researchers to seek innovations in software obfuscation solutions to contrast criminals that try to reverse engineer software.

DARPA (Defense Advanced Research Project Agency) and a team of researchers are turning towards new methods to overcome reverse engineering by using obfuscation to secure government and business security.

The Research Team, remodeling a safe-ware program is believing to develop new mediums reinforce with encryption, further development to conceal software code testable for secure protection of the intellectual property.

Safe-Ware first plans canvassed as obfuscation program last fall, but only recently it officially got underway.

Kurt Rohloff, an Associate Professor of Computer at NJIT (New Jersey Institute of Technology) who leads the team explained to the Signal Magazine that its was inspired by the new challenge.

“I have a peculiar fascination in supporting defense-relevant application,but problem that we’re facing this instance is to have a striking new theoretical innovation and there hasn’t been any hard or critical effort to get it work practically,” Rohloff told the magazine.

Rohloff explained that among the goals of SafeWare there is the development of an “open-source library for lattice crypto technology.”

“The immediate goal that we’re focusing on is knocking off a couple orders of magnitude to get a handle on how efficient these things can be so we can get a handle on what are the specific operations,”

Claiming that current obfuscation program shortfall on what he calls “quantifiable security models”, the Dr. Michael Hsieh, a program manager at DARPA’s Information Innovation Office that oversees Safe-Ware, hopes that project can distance itself from the “Security through Obscurity.” Hsieh hopes the researchers were able to find a balance between something determinable and challenging for an attacker to “De-obfuscate.”

“If successful, SafeWare technologies will provide provably-secure protection of sensitive intellectual property and algorithmic information in software that is vulnerable to capture and dissection,” wrote Hsieh on the project’s website

If you are interested give a look to the research paper titled “Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits” that described the effort of the researcher in the study of a new obfuscation mechanism designed to help restrain attacker hoping to reverse engineer software.

About the Author Prathyush Yaram

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

U.S. Gov imposed Visa restrictions on 13 individuals linked to commercial spyware activity

The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…

1 hour ago

A cyber attack paralyzed operations at Synlab Italia

A cyber attack has been disrupting operations at Synlab Italia, a leading provider of medical…

2 hours ago

Russia-linked APT28 used post-compromise tool GooseEgg to exploit CVE-2022-38028 Windows flaw

Russia-linked APT28 group used a previously unknown tool, dubbed GooseEgg, to exploit Windows Print Spooler…

12 hours ago

Hackers threaten to leak a copy of the World-Check database used to assess potential risks associated with entities

A financially motivated group named GhostR claims the theft of a sensitive database from World-Check…

19 hours ago

Windows DOS-to-NT flaws exploited to achieve unprivileged rootkit-like capabilities

Researcher demonstrated how to exploit vulnerabilities in the Windows DOS-to-NT path conversion process to achieve…

22 hours ago

A flaw in the Forminator plugin impacts hundreds of thousands of WordPress sites

Japan's CERT warns of a vulnerability in the Forminator WordPress plugin that allows unrestricted file uploads…

1 day ago

This website uses cookies.