HOP: Hardware makes Obfuscation Practical
暂无分享,去创建一个
Kartik Nayak | Elaine Shi | Satyanarayana V. Lokam | Vipul Goyal | Ling Ren | Christopher W. Fletcher | Nishanth Chandran
[1] Nico Döttling,et al. Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions , 2011, IACR Cryptol. ePrint Arch..
[2] Leslie G. Valiant,et al. Universal circuits (Preliminary Report) , 1976, STOC '76.
[3] Craig Gentry,et al. Succinct Randomized Encodings and their Applications. , 2014 .
[4] Elaine Shi,et al. GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation , 2015, ASPLOS.
[5] Allison Bishop,et al. Indistinguishability Obfuscation for Turing Machines with Unbounded Memory , 2015, IACR Cryptol. ePrint Arch..
[6] Jung Hee Cheon,et al. Cryptanalysis of the Multilinear Map over the Integers , 2014, EUROCRYPT.
[7] Jonathan Katz,et al. Universally Composable Multi-party Computation Using Tamper-Proof Hardware , 2007, EUROCRYPT.
[8] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[9] Christos Gkantsidis,et al. VC3: Trustworthy Data Analytics in the Cloud Using SGX , 2015, 2015 IEEE Symposium on Security and Privacy.
[10] Christos Gkantsidis,et al. Observing and Preventing Leakage in MapReduce , 2015, CCS.
[11] Russell Tessier,et al. Hardware-assisted code obfuscation for FPGA soft microprocessors , 2015, 2015 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[12] Elaine Shi,et al. Formal Abstractions for Attested Execution Secure Processors , 2017, EUROCRYPT.
[13] Srinivas Devadas,et al. Design space exploration and optimization of path oblivious RAM in secure processors , 2013, ISCA.
[14] Brice Minaud,et al. Cryptanalysis of the New CLT Multilinear Map over the Integers , 2016, EUROCRYPT.
[15] Payman Mohassel,et al. Valiant's Universal Circuit: Improvements, Implementation, and Applications , 2016, IACR Cryptol. ePrint Arch..
[16] Alex J. Malozemoff,et al. 5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs , 2016, CCS.
[17] Stefan Katzenbeisser,et al. Code Obfuscation against Static and Dynamic Reverse Engineering , 2011, Information Hiding.
[18] Thomas Schneider,et al. Valiant's Universal Circuit is Practical , 2016, EUROCRYPT.
[19] Rafail Ostrovsky,et al. Garbled RAM Revisited , 2014, EUROCRYPT.
[20] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[21] Oded Goldreich,et al. Towards a theory of software protection and simulation by oblivious RAMs , 1987, STOC.
[22] Dan Boneh,et al. Architectural Support For Copy And Tamper-Resistant Software PhD Thesis , 2003 .
[23] Tao Zhang,et al. HIDE: an infrastructure for efficiently protecting information leakage on the address bus , 2004, ASPLOS XI.
[24] G. Edward Suh,et al. AEGIS: architecture for tamper-evident and tamper-resistant processing , 2003 .
[25] Ashay Rane,et al. Raccoon: Closing Digital Side-Channels through Obfuscated Execution , 2015, USENIX Security Symposium.
[26] Lili Tan,et al. The worst-case execution time tool challenge 2006 , 2006, Second International Symposium on Leveraging Applications of Formal Methods, Verification and Validation (isola 2006).
[27] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[28] Srinivas Devadas,et al. A Low-Latency, Low-Area Hardware Oblivious RAM Controller , 2015, 2015 IEEE 23rd Annual International Symposium on Field-Programmable Custom Computing Machines.
[29] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[30] Ahmad-Reza Sadeghi,et al. Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs - (Full Version) , 2010, CHES.
[31] Ling Ren,et al. Path ORAM , 2012, J. ACM.
[32] Craig Gentry,et al. Homomorphic Evaluation of the AES Circuit , 2012, IACR Cryptol. ePrint Arch..
[33] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[34] Craig Gentry,et al. (Leveled) fully homomorphic encryption without bootstrapping , 2012, ITCS '12.
[35] Elaine Shi,et al. PHANTOM: practical oblivious computation in a secure processor , 2013, CCS.
[36] Ruby B. Lee,et al. Scalable architectural support for trusted software , 2010, HPCA - 16 2010 The Sixteenth International Symposium on High-Performance Computer Architecture.
[37] Amit Sahai,et al. On the (im)possibility of obfuscating programs , 2001, JACM.
[38] Ran Canetti,et al. Succinct Garbling and Indistinguishability Obfuscation for RAM Programs , 2015, STOC.
[39] Sanjam Garg. Program Obfuscation via Multilinear Maps , 2014, SCN.
[40] Dakshi Agrawal,et al. The EM Side-Channel(s) , 2002, CHES.
[41] Yael Tauman Kalai,et al. Program Obfuscation with Leaky Hardware , 2011, IACR Cryptol. ePrint Arch..
[42] Jonathan Katz,et al. Secure Computation of MIPS Machine Code , 2016, ESORICS.
[43] Jonathan Katz,et al. Functional Encryption from (Small) Hardwae Tokens , 2015, IACR Cryptol. ePrint Arch..
[44] Vladimir Kolesnikov,et al. A Practical Universal Circuit Construction and Secure Evaluation of Private Functions , 2008, Financial Cryptography.
[45] Dan Boneh,et al. Hacking Blind , 2014, 2014 IEEE Symposium on Security and Privacy.
[46] Srinivas Devadas,et al. Freecursive ORAM: [Nearly] Free Recursion and Integrity Verification for Position-based Oblivious RAM , 2015 .
[47] David Grawrock. Dynamics of a trusted platform: a building block approach , 2009 .
[48] Ran Canetti,et al. Universally composable security: a new paradigm for cryptographic protocols , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[49] Ahmad-Reza Sadeghi,et al. GarbledCPU: A MIPS processor for secure computation in hardware , 2016, 2016 53nd ACM/EDAC/IEEE Design Automation Conference (DAC).
[50] Satoshi Hada,et al. Zero-Knowledge and Code Obfuscation , 2000, ASIACRYPT.
[51] Srinivas Devadas,et al. A secure processor architecture for encrypted computation on untrusted programs , 2012, STC '12.
[52] Yuval Ishai,et al. Founding Cryptography on Tamper-Proof Hardware Tokens , 2010, IACR Cryptol. ePrint Arch..
[53] Srinivas Devadas,et al. Generalized external interaction with tamper-resistant hardware with bounded information leakage , 2013, CCSW.
[54] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.