Building Enclave-Native Storage Engines for Practical Encrypted Databases
暂无分享,去创建一个
Sheng Wang | Huorong Li | Yuanyuan Sun | Feifei Li | Yuanyuan Sun | Sheng Wang | Feifei Li | Huorong Li
[1] Christof Fetzer,et al. SPEICHER: Securing LSM-based Key-Value Stores using Shielded Execution , 2019, FAST.
[2] Tal Garfinkel,et al. When Virtual Is Harder than Real: Security Challenges in Virtual Machine Based Computing Environments , 2005, HotOS.
[3] Ramez Elmasri,et al. Fundamentals of Database Systems , 1989 .
[4] Shoumeng Yan,et al. Switchless Calls Made Practical in Intel SGX , 2018 .
[5] Alexey Gribov,et al. StealthDB: a Scalable Encrypted Database with Full SQL Query Support , 2017, Proc. Priv. Enhancing Technol..
[6] Mark Silberstein,et al. Eleos: ExitLess OS Services for SGX Enclaves , 2017, EuroSys.
[7] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[8] Rishabh Poddar,et al. Arx: A Strongly Encrypted Database System , 2016, IACR Cryptol. ePrint Arch..
[9] Thomas Ristenpart,et al. When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography , 2010, NDSS.
[10] David A. Kaplan,et al. {AMD} x86 Memory Encryption Technologies , 2016 .
[11] Jean-Pierre Seifert,et al. Insecure Until Proven Updated: Analyzing AMD SEV's Remote Attestation , 2019, CCS.
[12] G. Edward Suh,et al. Caches and hash trees for efficient memory integrity verification , 2003, The Ninth International Symposium on High-Performance Computer Architecture, 2003. HPCA-9 2003. Proceedings..
[13] Angelos D. Keromytis,et al. Blind Seer: A Scalable Private DBMS , 2014, 2014 IEEE Symposium on Security and Privacy.
[14] Alexander Nilsson,et al. A Survey of Published Attacks on Intel SGX , 2020, ArXiv.
[15] Kapil Vaswani,et al. EnclaveDB: A Secure Database Using SGX , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[16] Todd M. Austin,et al. Regaining lost cycles with HotCalls: A fast interface for SGX secure enclaves , 2017, 2017 ACM/IEEE 44th Annual International Symposium on Computer Architecture (ISCA).
[17] Adam Silberstein,et al. Benchmarking cloud serving systems with YCSB , 2010, SoCC '10.
[18] Jaehyuk Huh,et al. ShieldStore: Shielded In-memory Key-value Storage with SGX , 2019, EuroSys.
[19] Erez Petrank,et al. A lock-free B+tree , 2012, SPAA '12.
[20] Rishabh Poddar,et al. Oblix: An Efficient Oblivious Search Index , 2018, 2018 IEEE Symposium on Security and Privacy (SP).
[21] Ion Stoica,et al. Opaque: An Oblivious and Encrypted Distributed Analytics Platform , 2017, NSDI.
[22] Sameer Wagh,et al. The Pyramid Scheme: Oblivious RAM for Trusted Processors , 2017, ArXiv.
[23] Shane V. Howley,et al. A non-blocking internal binary search tree , 2012, SPAA '12.
[24] David Cash,et al. Leakage-Abuse Attacks Against Searchable Encryption , 2015, IACR Cryptol. ePrint Arch..
[25] Eljas Soisalon-Soininen,et al. Concurrency control and recovery for balanced B-link trees , 2005, The VLDB Journal.
[26] Ahmad-Reza Sadeghi,et al. AmazonIA: when elasticity snaps back , 2011, CCS '11.
[27] Marten van Dijk,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003, ICS '03.
[28] Rishabh Poddar,et al. Arx: An Encrypted Database using Semantically Secure Encryption , 2019, Proc. VLDB Endow..
[29] Michael A. Bender,et al. Concurrent cache-oblivious b-trees , 2005, SPAA '05.
[30] Faith Ellen,et al. Non-blocking binary search trees , 2010, PODC.
[31] Dawn Xiaodong Song,et al. Practical techniques for searches on encrypted data , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[32] Radu Sion,et al. TrustedDB: A Trusted Hardware-Based Database with Privacy and Data Confidentiality , 2011, IEEE Transactions on Knowledge and Data Engineering.
[33] Rafail Ostrovsky,et al. Private Large-Scale Databases with Distributed Searchable Symmetric Encryption , 2016, CT-RSA.
[34] Olivier Bernard,et al. Practical Passive Leakage-abuse Attacks Against Symmetric Searchable Encryption , 2017, SECRYPT.
[35] Kristie B. Hadden,et al. 2020 , 2020, Journal of Surgical Orthopaedic Advances.
[36] Samuel Madden,et al. Processing Analytical Queries over Encrypted Data , 2013, Proc. VLDB Endow..
[37] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[38] Ramarathnam Venkatesan,et al. Orthogonal Security with Cipherbase , 2013, CIDR.
[39] Elaine Shi,et al. Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.
[40] Hari Balakrishnan,et al. CryptDB: protecting confidentiality with encrypted query processing , 2011, SOSP.
[41] A. Yao,et al. Fair exchange with a semi-trusted third party (extended abstract) , 1997, CCS '97.
[42] Neeraj Mittal,et al. Fast concurrent lock-free binary search trees , 2014, PPoPP.
[43] Srinivas Devadas,et al. Intel SGX Explained , 2016, IACR Cryptol. ePrint Arch..
[44] Amr El Abbadi,et al. TaoStore: Overcoming Asynchronicity in Oblivious Data Storage , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[45] Ken Eguro,et al. Azure SQL Database Always Encrypted , 2020, SIGMOD Conference.
[46] Ken Eguro,et al. Transaction processing on confidential data using cipherbase , 2015, 2015 IEEE 31st International Conference on Data Engineering.
[47] Nathan Chenette,et al. Order-Preserving Encryption Revisited: Improved Security Analysis and Alternative Solutions , 2011, CRYPTO.
[48] Ariel J. Feldman,et al. Lest we remember: cold-boot attacks on encryption keys , 2008, CACM.
[49] Vitaly Shmatikov,et al. The Tao of Inference in Privacy-Protected Databases , 2018, Proc. VLDB Endow..
[50] Hugo Krawczyk,et al. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries , 2013, IACR Cryptol. ePrint Arch..
[51] Engin Kirda,et al. A security analysis of Amazon's Elastic Compute Cloud service , 2012, IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN 2012).
[52] Matei Zaharia,et al. ObliDB: Oblivious Query Processing using Hardware Enclaves , 2017 .
[53] David M. Eyers,et al. SCONE: Secure Linux Containers with Intel SGX , 2016, OSDI.
[54] Feifei Li,et al. Dynamic authenticated index structures for outsourced databases , 2006, SIGMOD Conference.