65 Hits in 8.6 sec

Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs

Christopher W. Fletchery, Ling Ren, Xiangyao Yu, Marten Van Dijk, Omer Khan, Srinivas Devadas
2014 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA)  
Second, we show how changing the leakage limit impacts program efficiency.  ...  This paper makes two contributions. First, we show how a secure processor can bound ORAM timing channel leakage to a user-controllable leakage limit.  ...  In short, we propose mechanisms that allow a secure processor to trade-off information leakage and program efficiency in a provably secure and disciplined way.  ... 
doi:10.1109/hpca.2014.6835932 dblp:conf/hpca/FletcherRYDKD14 fatcat:kr7ult7xdbfrlolpdbdbwmgpce

KloakDB: A Platform for Analyzing Sensitive Data with K-anonymous Query Processing [article]

Madhav Suresh, Zuohao She, William Wallace, Adel Lahlou, Jennie Rogers
2020 arXiv   pre-print
In addition, stakeholders set k, creating a novel trade-off between privacy and performance.  ...  We make the query's observable transcript k-anonymous because it is a popular standard for data release in many domains including medicine, educational research, and government data.  ...  It provides robust workload protection policies, preventing unauthorized information leakage, and provides a knob to trade off between privacy and performance.  ... 
arXiv:1904.00411v2 fatcat:akwbhi7o6vb5zi3sq6rjxvch7q

HORAM: Hybrid Oblivious Random Access Memory Scheme for Secure Path Hiding in Distributed Environment

Snehalata Funde, Gandharba Swain
2021 International Journal of Advanced Computer Science and Applications  
information leakage and program efficiency trade-offs," 2014 IEEE 20th [12] C. Priebe, K. Vaswani, and M.  ...  Devadas, encrypted database with full sql query support”, arXiv preprint "Suppressing the Oblivious RAM timing channel while making arXiv:1711. 02279, 2017.  ... 
doi:10.14569/ijacsa.2021.0121162 fatcat:solh26mwynf3jlmba2vy3cnspq

Preventing Page Faults from Telling Your Secrets

Shweta Shinde, Zheng Leong Chua, Viswesh Narayanan, Prateek Saxena
2016 Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security - ASIA CCS '16  
In this paper, we show that the page fault side-channel has sufficient channel capacity to extract bits of encryption keys from commodity implementations of cryptographic routines in OpenSSL and Libgcrypt-leaking  ...  Such "enclaved execution" systems are vulnerable to several side-channels, one of which is the page fault channel.  ...  NRF2014NCR-NCR001-21) and administered by the National Cybersecurity R&D Directorate. This work is supported in part by a research grant from Symantec.  ... 
doi:10.1145/2897845.2897885 dblp:conf/ccs/ShindeCNS16 fatcat:n72jnbdkirhorbcz6a7du7t46y

Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks [article]

Shweta Shinde, Zheng Leong Chua, Viswesh Narayanan, Prateek Saxena
2016 arXiv   pre-print
In this paper, we show that the page fault side-channel has sufficient channel capacity to extract bits of encryption keys from commodity implementations of cryptographic routines in OpenSSL and Libgcrypt  ...  Such "enclaved execution" systems are vulnerable to several side-channels, one of which is the page fault channel.  ...  NRF2014NCR-NCR001-21) and administered by the National Cybersecurity R&D Directorate.  ... 
arXiv:1506.04832v2 fatcat:arnizxazvfahzejmtqvwbfmq6q

BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking [article]

Hossam ElAtali, Lachlan J. Gunn, Hans Liljestrand, N. Asokan
2022 arXiv   pre-print
BliMe consists of a novel and minimal set of ISA extensions that uses taint tracking to ensure the confidentiality of sensitive (client) data even in the presence of server malware, run-time attacks, and  ...  side-channel attacks.  ...  ACKNOWLEDGEMENTS This work is supported in part by Natural Sciences and Engineering Research Council of Canada (RGPIN-2020-04744) and Intel Labs via the Private-AI consortium, and by the Academy of Finland  ... 
arXiv:2204.09649v4 fatcat:f37qznqarnda5kzni32jlxndt4

Secure Management of Biomedical Data With Cryptographic Hardware

M. Canim, M. Kantarcioglu, B. Malin
2012 IEEE Transactions on Information Technology in Biomedicine  
At the same time, various regulations require that such data be shared beyond the initial collecting organization (e.g., an academic medical center).  ...  Within this framework, we define a secure protocol to process genomic data and perform a series of experiments to demonstrate that such an approach can be run in an efficient manner for typical biomedical  ...  In [26] , the potential attacks for interval-based approaches were explored and models were developed to analyze the trade-off between efficiency and disclosure risk.  ... 
doi:10.1109/titb.2011.2171701 pmid:22010157 pmcid:PMC4156282 fatcat:5et3duqo55cy7pwjagccixwrsq

Telling Your Secrets without Page Faults: Stealthy Page Table-Based Attacks on Enclaved Execution

Jo Van Bulck, Nico Weichbrodt, Rüdiger Kapitza, Frank Piessens, Raoul Strackx
2017 USENIX Security Symposium  
As a response, a number of state-of-the-art defense techniques has been proposed that suppress page faults during enclave execution.  ...  Recent research convincingly demonstrated that adversarial system software can extract sensitive data from enclaved applications by carefully revoking access rights on enclave pages, and recording the  ...  Jo Van Bulck and Raoul Strackx are supported by a grant of the Research Foundation -Flanders (FWO).  ... 
dblp:conf/uss/BulckWKPS17 fatcat:mgz5nndp45aalcvmifeaul2sia

Manticore: Efficient Framework for Scalable Secure Multiparty Computation Protocols [article]

Sergiu Carpov, Kevin Deforth, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev, Jonathan Katz, Iraklis Leontiadis, M. Mohammadi, Abson Sae-Tang, Marius Vuille
2021 IACR Cryptology ePrint Archive  
Our logistic regression solution placed first at Track 3 of the annual iDASH'2020 Competition. Finally, we mention a novel oblivious sorting algorithm built using Manticore.  ...  We revisit some of the basic MPC operations such as real-valued polynomial evaluation, division, logarithms, exponentials and comparisons by employing our modular lift in combination with existing efficient  ...  singular features and unbalanced datasets, and an improved oblivious sorting.  ... 
dblp:journals/iacr/CarpovDGGJKLMSV21 fatcat:mjx6bpo5obbzbjmxzf3bkaotra

Rethinking the adversary and operational characteristics of deniable storage

Austen Barker, Yash Gupta, James Hughes, Ethan L. Miller, Darrell D. E. Lon
2022 Journal of Surveillance, Security and Safety  
To hide the user's ability to run a deniable system and prevent information leakage, a user accesses Artifice through a separate OS stored on an external Linux live disk.  ...  For some users, this creates a need for hidden volumes that provide plausible deniability, the ability to deny the existence of sensitive information.  ...  Financial support and sponsorship This work was supported by National Science Foundation grant numbers (IIP-1266400, IIP184545), and award number (CNS-1814347), and by the industrial partners of the Center  ... 
doi:10.20517/jsss.2020.22 fatcat:pdpjgx62cbccrhr5ki4jbb3h24

A Comprehensive Study of the Past, Present, and Future of Data Deduplication

Wen Xia, Hong Jiang, Dan Feng, Fred Douglis, Philip Shilane, Yu Hua, Min Fu, Yucheng Zhang, Yukun Zhou
2016 Proceedings of the IEEE  
| Data deduplication, an efficient approach to data reduction, has gained increasing attention and popularity in large-scale storage systems due to the explosive growth of digital data.  ...  more computationally efficient than the traditional compression approaches in large-scale storage systems.  ...  Acknowledgment The authors would like to thank the anonymous reviewers for their valuable comments and feedback. The authors would also like to thank S. Mandal, G. Kuenning, V. Tarasov, and E.  ... 
doi:10.1109/jproc.2016.2571298 fatcat:krfdbgm5pjemnmaswml7k4uv4e

Privacy in Targeted Advertising: A Survey [article]

Imdad Ullah, Roksana Boreli, Salil S. Kanhere
2021 arXiv   pre-print
The advertising and analytics companies collect, aggregate, process and trade a vast amount of user's personal data, which has prompted serious privacy concerns among both individuals and organisations  ...  We outline details of the information flow between the advertising platform and ad/analytics networks, the profiling process, advertising sources and criteria, the measurement analysis of targeted advertising  ...  This version is generated by using Bloom filters [144] , an efficient data structure; they evaluate the privacy versus personalisation trade-off.  ... 
arXiv:2009.06861v3 fatcat:exocmcbupbhq5nc3gnicg3zg2i

Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security [article]

Keita Emura, Shiho Moriai, Takuma Nakajima, Masato Yoshimi
2022 IACR Cryptology ePrint Archive  
Compared to direct HTTPS communication between a service provider and a user, employing our Cache-22 system has a merit to drastically reduce communications between a cache server and the service provider  ...  The importance of communication privacy is being increasingly and widely recognized; therefore, we anticipate that nearly all end-to-end communication will be encrypted via secure sockets layer/transport  ...  trade-off.  ... 
dblp:journals/iacr/EmuraMNY22 fatcat:fiqgpdl3cjcwvmbju6k23qla74

Preserving Privacy in Speaker and Speech Characterisation

Andreas Nautsch, Abelino Jiménez, Amos Treiber, Jascha Kolberg, Catherine Jasserand, Els Kindt, Héctor Delgado, Massimiliano Todisco, Mohamed Amine Hmani, Aymen Mtibaa, Mohammed Ahmed Abdelraheem, Alberto Abad (+11 others)
2019 Computer Speech and Language  
; (ii) leaked, encrypted biometric information is irreversible, and that (iii) biometric references are renewable.  ...  With the aim of fostering progress and collaboration between researchers in the speech, biometrics and applied cryptography communities, this survey article provides an introduction to the field, starting  ...  a Tecnologia (FCT) with reference UID/CEC/50021/2013; the SpeechXRays project that has received funding from the European Union's Horizon 2020 research and innovation program under grant agreement no  ... 
doi:10.1016/j.csl.2019.06.001 fatcat:lgq6bz2y5zepvfbrfznhboplha

Architecture For Data Management

Marko Vukolic
2015 Zenodo  
We start by defining the design requirements of the architecture, motivated by use cases and then review the state-of-the-art.  ...  In this document we present the preliminary architecture of the SUPERCLOUD data management and storage.  ...  Oblivious storage Oblivious RAMs (ORAMs) [88] enable the storage of outsourced data while ensuring the access pattern of the data is not leaked.  ... 
doi:10.5281/zenodo.49788 fatcat:5oup2d7sk5dm7efj77pjvg2bru
« Previous Showing results 1 — 15 out of 65 results