Categories: Breaking NewsSecurity

DARPA even more interested in software Obfuscation Solutions

DARPA is sustaining researchers to seek innovations in software obfuscation solutions to contrast criminals that try to reverse engineer software.

DARPA (Defense Advanced Research Project Agency) and a team of researchers are turning towards new methods to overcome reverse engineering by using obfuscation to secure government and business security.

The Research Team, remodeling a safe-ware program is believing to develop new mediums reinforce with encryption, further development to conceal software code testable for secure protection of the intellectual property.

Safe-Ware first plans canvassed as obfuscation program last fall, but only recently it officially got underway.

Kurt Rohloff, an Associate Professor of Computer at NJIT (New Jersey Institute of Technology) who leads the team explained to the Signal Magazine that its was inspired by the new challenge.

“I have a peculiar fascination in supporting defense-relevant application,but problem that we’re facing this instance is to have a striking new theoretical innovation and there hasn’t been any hard or critical effort to get it work practically,” Rohloff told the magazine.

Rohloff explained that among the goals of SafeWare there is the development of an “open-source library for lattice crypto technology.”

“The immediate goal that we’re focusing on is knocking off a couple orders of magnitude to get a handle on how efficient these things can be so we can get a handle on what are the specific operations,”

Claiming that current obfuscation program shortfall on what he calls “quantifiable security models”, the Dr. Michael Hsieh, a program manager at DARPA’s Information Innovation Office that oversees Safe-Ware, hopes that project can distance itself from the “Security through Obscurity.” Hsieh hopes the researchers were able to find a balance between something determinable and challenging for an attacker to “De-obfuscate.”

“If successful, SafeWare technologies will provide provably-secure protection of sensitive intellectual property and algorithmic information in software that is vulnerable to capture and dissection,” wrote Hsieh on the project’s website

If you are interested give a look to the research paper titled “Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits” that described the effort of the researcher in the study of a new obfuscation mechanism designed to help restrain attacker hoping to reverse engineer software.

About the Author Prathyush Yaram

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Critical Fortinet FortiClientEMS flaw allows remote code execution

Fortinet warns of a critical FortiClientEMS vulnerability that lets remote attackers run malicious code without…

1 hour ago

BeyondTrust fixes critical pre-auth bug allowing remote code execution

BeyondTrust patched a critical pre-auth flaw in Remote Support and PRA that could let attackers…

2 hours ago

European Commission probes cyberattack on mobile device management system

The European Commission is investigating a cyberattack after detecting signs that its mobile device management…

8 hours ago

Attackers abuse SolarWinds Web Help Desk to install Zoho agents and Velociraptor

Huntress confirmed active SolarWinds Web Help Desk exploits, where attackers installed Zoho tools for persistence,…

10 hours ago

Romania’s national oil pipeline firm Conpet reports cyberattack<gwmw style="display:none;"></gwmw>

Romania’s national oil pipeline operator Conpet said a cyberattack disrupted its business systems and temporarily…

13 hours ago

Flickr moves to contain data exposure, warns users of phishing

Flickr says a flaw at a third-party email provider may have exposed users’ names, email…

22 hours ago

This website uses cookies.