10
Secure Triggers Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein Core Security Technologies {ek,wata}@coresecurity.com

Secure Triggers

Embed Size (px)

DESCRIPTION

Secure Triggers. Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein. Core Security Technologies. {ek,wata}@coresecurity.com. Definitions. Let S be a secret and P={p} a family of predicates. Let p be a predicate in P - PowerPoint PPT Presentation

Citation preview

Page 1: Secure Triggers

Secure TriggersAriel Futoransky, Emiliano Kargieman,

Carlos Sarraute, Ariel Waissbein

Core Security Technologies

{ek,wata}@coresecurity.com

Page 2: Secure Triggers

Definitions

• Let S be a secret and P={p} a family of predicates.Let p be a predicate in P

• Def: A trigger is an algorithm T(S,p) that takes any input x in {0,1}* and returns S iff p(x)=true.Else, it returns nothing.

• Def: The trigger T(S,p) is said secure if a polynomial-time attacker, given P, the sampling distribution, and arbitrary access to T(S,p), cannot learn anything about S.

Page 3: Secure Triggers

Examples (1): Simple Trigger

• If the input x is equal to a private value y, then the Secret S is released.

T(S,“x=y?")

x = y? S

Page 4: Secure Triggers

Examples (2): Multiple Strings Trigger

• If the input set X={x1,…,xn} includes a private set Y ={y1,…,yt}, then the Secret S is released.

T(S,“XY?")x1 ?

S……

xn

y1…

yn

Page 5: Secure Triggers

Examples (3): Subsequence Trigger

• If xi1 = y1, …, xit = yt, then the secret S is released. – Where both {yj}, and {ik} are private.

T(S,“(xjk)=(yk)?")x

xi1

Page 6: Secure Triggers

Examples (3): Subsequence Trigger

• If xi1 = y1, …, xit = yt, then the secret S is released. – Where both {yj}, and {ik} are private.

T(S,“(xjk)=(yk)?")x

xi1

xi2

Page 7: Secure Triggers

Examples (3): Subsequence Trigger

• If xi1 = y1, …, xit = yt, then the secret S is released. – Where both {yj}, and {ik} are private.

T(S,“(xjk)=(yk)?")x

xit

xi1

xi2

Page 8: Secure Triggers

Examples (3): Subsequence Trigger

• If xi1 = y1, …, xit = yt, then the secret S is released. – Where both {yj}, and {ik} are private.

T(S,“(xjk)=(yk)?")x

? Sy1

yt

=

=

x

xit

xi1

xi2 y2=

Page 9: Secure Triggers

Applications of the triggers

• Information Warfare WormAttack

• Online automated shopping

• Other– Software protection– …

Page 10: Secure Triggers

Results

• Generic definitions of security for Secure Triggers on the UCS framework

• Instantiations:• Simple triggers are secure

• Multiple strings triggers are secure

• Subsequence triggers are secure

• Paper submitted for publication,let us know if you want a copy