Filters








533 Hits in 7.2 sec

Design space exploration and optimization of path oblivious RAM in secure processors

Ling Ren, Xiangyao Yu, Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas
2013 Proceedings of the 40th Annual International Symposium on Computer Architecture - ISCA '13  
We introduce background eviction schemes to prevent Path ORAM failure and allow for a performance-driven design space exploration.  ...  To prevent this address leakage, the security community has proposed ORAM (Oblivious RAM).  ...  EVALUATION Path ORAM Design Space Exploration We first explore the design space of Path ORAM to find configurations that minimize access overhead in Equations 1 and 2.  ... 
doi:10.1145/2485922.2485971 dblp:conf/isca/RenYFDD13 fatcat:b4cq6azqazelhgvub6dycwmfji

Design space exploration and optimization of path oblivious RAM in secure processors

Ling Ren, Xiangyao Yu, Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas
2013 SIGARCH Computer Architecture News  
We introduce background eviction schemes to prevent Path ORAM failure and allow for a performance-driven design space exploration.  ...  To prevent this address leakage, the security community has proposed ORAM (Oblivious RAM).  ...  EVALUATION Path ORAM Design Space Exploration We first explore the design space of Path ORAM to find configurations that minimize access overhead in Equations 1 and 2.  ... 
doi:10.1145/2508148.2485971 fatcat:zapbyu3fkjbk5ln5z3x6pi7kyq

Revisiting Definitional Foundations of Oblivious RAM for Secure Processor Implementations [article]

Syed Kamran Haider and Omer Khan and Marten van Dijk
2017 arXiv   pre-print
Oblivious RAM (ORAM) is a renowned technique to hide the access patterns of an application to an untrusted memory.  ...  An artifact of this definition is that it does not apply to modern ORAM implementations adapted in current secure processors technology because of their arbitrary lengths of memory access sequences depending  ...  Flat ORAM [22] , on the other hand, is designed and optimized for the secure processor se ing and is secure under the Goldreich and Ostrovsky equivalent of a write-only ORAM de nition for in nite length  ... 
arXiv:1706.03852v3 fatcat:2acqi7yu4fc2fdkexlvtk7ridq

PHANTOM

Martin Maas, Eric Love, Emil Stefanov, Mohit Tiwari, Elaine Shi, Krste Asanovic, John Kubiatowicz, Dawn Song
2013 Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security - CCS '13  
the data needed, and completing and reviewing the collection of information.  ...  Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining  ...  A concurrent project has also used Path ORAM to propose a secure processor (Ascend [21, 69] ); that work focused on optimizing the basic Path ORAM algorithm and on a design-space exploration of algorithm  ... 
doi:10.1145/2508859.2516692 dblp:conf/ccs/MaasLSTSAKS13 fatcat:q2y4y6qas5fobe5nb47xla42be

Oblivious Parallel RAM and Applications [chapter]

Elette Boyle, Kai-Min Chung, Rafael Pass
2015 Lecture Notes in Computer Science  
In particular, we demonstrate the construction of a garbled PRAM compiler based on an OPRAM compiler and secure identity-based encryption.  ...  We propose and attain the notion of Oblivious PRAM.  ...  We additionally utilize a space optimization due to Gentry et al.  ... 
doi:10.1007/978-3-662-49099-0_7 fatcat:hax4sukl6bfnvhcio47p5krile

The Pyramid Scheme: Oblivious RAM for Trusted Processors [article]

Manuel Costa, Lawrence Esswood, Olga Ohrimenko, Felix Schuster, Sameer Wagh
2017 arXiv   pre-print
In this paper, we explore Oblivious RAM (ORAM) designs that prevent these information leaks under the constraints of modern SGX processors.  ...  Modern processors, e.g., Intel SGX, allow applications to isolate secret code and data in encrypted memory regions called enclaves.  ...  Acknowledgments We thank Cédric Fournet, Ian Kash, and Markulf Kohlweiss for helpful discussions.  ... 
arXiv:1712.07882v1 fatcat:u7lxjx7pnbcallfc7qb6i6ru4y

A secure processor architecture for encrypted computation on untrusted programs

Christopher W. Fletcher, Marten van Dijk, Srinivas Devadas
2012 Proceedings of the seventh ACM workshop on Scalable trusted computing - STC '12  
To this end we propose a secure processor architecture, called Ascend, that guarantees privacy of data when arbitrary programs use the data running in a cloud-like environment (e.g., an untrusted server  ...  Periodic accesses to external instruction and data memory are performed through an Oblivious RAM (ORAM) interface to prevent leakage through memory access patterns.  ...  PROCESSOR ARCHITECTURE In this section, we describe the ORAM interface and a performance-optimized Ascend processor design.  ... 
doi:10.1145/2382536.2382540 fatcat:mrw7wwkxv5dwjp4sbaepnkrb3y

Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processors [article]

Syed Kamran Haider, Marten van Dijk
2017 arXiv   pre-print
Oblivious RAM (ORAM) is a cryptographic primitive which obfuscates the access patterns to a storage thereby preventing privacy leakage.  ...  Flat ORAM resolves these bottlenecks by introducing a simple idea of Occupancy Map (OccMap) which efficiently manages the memory occupancy information resulting in far better performance.  ...  is discussed in detail and the design space is comprehensively explored.  ... 
arXiv:1611.01571v4 fatcat:ljfj4crpnfgllig3hhjdybzkiq

Raccoon: Closing Digital Side-Channels through Obfuscated Execution

Ashay Rane, Calvin Lin, Mohit Tiwari
2015 USENIX Security Symposium  
We argue about the correctness and security of our compiler transformations and demonstrate that our transformations are safe in the context of a modern processor.  ...  The key idea is to obfuscate the program at the source code level to provide the illusion that many extraneous program paths are executed.  ...  This work was funded in part by NSF Grants DRL-1441009 and CNS-1314709 and a gift from Qualcomm.  ... 
dblp:conf/uss/RaneLT15 fatcat:go7xjbdlqzh45bizmsxx4quxsu

Flat ORAM: A Simplified Write-Only Oblivious RAM Construction for Secure Processors

Syed Haider, Marten van Dijk
2019 Cryptography  
Oblivious RAM (ORAM) is a cryptographic primitive which obfuscates the access patterns to a storage, thereby preventing privacy leakage.  ...  Flat ORAM introduces a simple idea of Occupancy Map (OccMap) to efficiently manage the memory occupancy information resulting in far better performance.  ...  The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.  ... 
doi:10.3390/cryptography3010010 fatcat:d2avcygye5aa7jh4fpivjecjkm

PrORAM

Xiangyao Yu, Syed Kamran Haider, Ling Ren, Christopher Fletcher, Albert Kwon, Marten van Dijk, Srinivas Devadas
2015 Proceedings of the 42nd Annual International Symposium on Computer Architecture - ISCA '15  
In particular, we propose a dynamic ORAM prefetching technique called PrO-RAM (Dynamic Prefetcher for ORAM) and comprehensively explore its design space.  ...  While it might seem apparent that obliviousness and locality are two contradictory concepts, we challenge this intuition by exploiting data locality in ORAM without sacrificing security.  ...  Acknowledgments: This research was partially supported by QCRI under the QCRI-CSAIL partnership and by the National Science Foundation.  ... 
doi:10.1145/2749469.2750413 dblp:conf/isca/YuHRFKDD15 fatcat:uxbnv4fpcnc73f3ck5ycponxwm

GhostRider

Chang Liu, Austin Harris, Martin Maas, Michael Hicks, Mohit Tiwari, Elaine Shi
2015 SIGPLAN notices  
One way to achieve MTO is to employ Oblivious RAM (ORAM), allocating all code and data in a single ORAM bank, and to also disable caches or fix the rate of memory traffic.  ...  This paper presents a new, co-designed compiler and architecture called GhostRider for supporting privacy preserving computation in the cloud.  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the US Army Research Laboratory  ... 
doi:10.1145/2775054.2694385 fatcat:zj6ukiorybaohajnsooue3ie7u

SCORAM

Xiao Shaun Wang, Yan Huang, T-H. Hubert Chan, Abhi Shelat, Elaine Shi
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
Oblivious RAMs (ORAMs) have traditionally been measured by their bandwidth overhead and client storage.  ...  We then present scoram, a heuristic compact ORAM design optimized for secure computation protocols.  ...  We would like to thank Marten van Dijk, Dov Gordon, Jonathan Katz, Kartik Nayak, and Saba Eskandarian for numerous helpful discussions.  ... 
doi:10.1145/2660267.2660365 dblp:conf/ccs/WangHCSS14 fatcat:mrefrwxeg5ekznre2sz7qanyy4

Data Oblivious Algorithms for Multicores [article]

Vijaya Ramachandran, Elaine Shi
2021 arXiv   pre-print
It has optimal caching cost, and it is only a log log n factor off from optimal work and about a log n factor off in terms of span; moreover, it achieves small constant factors in its bounds.  ...  We first show that data-oblivious sorting can be accomplished by a binary fork-join algorithm with optimal total work and optimal (cache-oblivious) cache complexity, and in O(log n log log n) span (i.e  ...  There has been some prior work exploring the design of parallel data-oblivious algorithms.  ... 
arXiv:2008.00332v2 fatcat:fpj5e7tqjfbe7audobaqj7xv3y

Shroud: ensuring private access to large-scale data in the data center

Jacob R. Lorch, Bryan Parno, James W. Mickens, Mariana Raykova, Joshua Schiffman
2013 USENIX Conference on File and Storage Technologies  
Specifically, we show, via new techniques such as oblivious aggregation, how to securely use many inexpensive secure coprocessors acting in parallel to improve request latency.  ...  We achieve our goals by adapting oblivious RAM algorithms to enable large-scale parallelization.  ...  Acknowledgments The authors thank Sumeet Bajaj and Radu Sion for providing information about the IBM 4764, Barry Bond and Shrinath Eswarahally for helping us with the Infineon SLE 88 cards, and Jeremy  ... 
dblp:conf/fast/LorchPM0S13 fatcat:j3kn5x446bgxzneagxrww37ifm
« Previous Showing results 1 — 15 out of 533 results