It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
In this paper, we show how to construct secure obfuscation for Deterministic Finite Automata, assuming non-uniformly strong one-way functions exist. We revisit the software protection approaches originally proposed by [5, 10, 12, 17] and revise them to the current obfuscation setting of Barak et al. . Under this model, we introduce an efficient oracle that retains some 'small' secret about the original program. Using this secret, we can construct an obfuscator and two-party protocol that securely obfuscates Deterministic Finite Automata against malicious adversaries. The security of this model retains the strong 'virtual black box' property originally proposed in  while incorporating the stronger condition of dependent auxiliary inputs in . Additionally, we show that our techniques remain secure under concurrent self-composition with adaptive inputs and that Turing machines are obfuscatable under this model.
The aim of this paper is to show how certain diverse and advanced techniques of information processing and system theory might be integrated into a model of an intelligent, complex entity capable of materially enhancing an advanced information management system. To this end, we first examine the notion of intelligence and ask whether a semblance thereof can arise in a system consisting of ensembles of finite-state automata. Our goal is to find a functional model of intelligence in an information-management setting that can be used as a tool. The purpose of this tool is to allow us to create systems of increasing complexity and utility, eventually reaching the goal of an intelligent information management system that provides and anticipates needed data and information. We base our attempt on the ideas of general system theory where the four topics of system identification, modeling, optimization, and control provide the theoretical framework for constructing a complex system that will be capable of interacting with complex systems in the real world. These four key topics are discussed within the purview of cellular automata, neural networks, and evolutionary programming. This is a report of ongoing work, and not yet a success story of a synthetic intelligent system.
Program obfuscation, if possible and practical, would have a considerable impact on the way we pro- tect software systems today. It would be instrumental in protecting intellectual property, preventing software piracy, and managing use-control applications.
Originally posted by jadedANDcynical
A couple of phrases in that caught my eye: "deterministic finite automata" and "Turing machines"