On the Trade-Offs in Oblivious Execution Techniques
暂无分享,去创建一个
[1] Helmut Veith,et al. Secure two-party computations in ANSI C , 2012, CCS.
[2] Jakob Engblom,et al. The worst-case execution-time problem—overview of methods and survey of tools , 2008, TECS.
[3] Elaine Shi,et al. Path ORAM: an extremely simple oblivious RAM protocol , 2012, CCS.
[4] Srinivas Devadas,et al. A secure processor architecture for encrypted computation on untrusted programs , 2012, STC '12.
[5] Elaine Shi,et al. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound , 2015, IACR Cryptol. ePrint Arch..
[6] Shweta Shinde,et al. Panoply: Low-TCB Linux Applications With SGX Enclaves , 2017, NDSS.
[7] Rafail Ostrovsky,et al. Software protection and simulation on oblivious RAMs , 1996, JACM.
[8] David H. Ackley,et al. Randomized instruction set emulation to disrupt binary code injection attacks , 2003, CCS '03.
[9] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[10] Yihua Zhang,et al. PICCO: a general-purpose compiler for private distributed computation , 2013, CCS.
[11] Hovav Shacham,et al. On the effectiveness of address-space randomization , 2004, CCS '04.
[12] Jan Svartvik,et al. A __ comprehensive grammar of the English language , 1988 .
[13] Gernot Heiser,et al. The Last Mile: An Empirical Study of Timing Channels on seL4 , 2014, CCS.
[14] Benny Pinkas,et al. SCiFI - A System for Secure Face Identification , 2010, 2010 IEEE Symposium on Security and Privacy.
[15] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[16] George Danezis,et al. Proceedings of the 2012 ACM conference on Computer and communications security , 2012, CCS 2012.
[17] Steven Gianvecchio,et al. Detecting covert timing channels: an entropy-based approach , 2007, CCS '07.
[18] Charles V. Wright,et al. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[19] Marcus Peinado,et al. Controlled-Channel Attacks: Deterministic Side Channels for Untrusted Operating Systems , 2015, 2015 IEEE Symposium on Security and Privacy.
[20] Elaine Shi,et al. Memory Trace Oblivious Program Execution , 2013, 2013 IEEE 26th Computer Security Foundations Symposium.
[21] Dan Boneh,et al. Architectural support for copy and tamper resistant software , 2000, SIGP.
[22] Emmett Witchel,et al. InkTag: secure applications on an untrusted operating system , 2013, ASPLOS '13.
[23] Zhenkai Liang,et al. DroidVault: A Trusted Data Vault for Android Devices , 2014, 2014 19th International Conference on Engineering of Complex Computer Systems.
[24] Angelos D. Keromytis,et al. Countering code-injection attacks with instruction-set randomization , 2003, CCS '03.
[25] P. Saxena,et al. Protecting Legacy Applications with a Purely Hardware TCB , 2015 .
[26] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.
[27] Elaine Shi,et al. GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation , 2015, ASPLOS.
[28] Jonathan Katz,et al. Secure two-party computation in sublinear (amortized) time , 2012, CCS.
[29] Shweta Shinde,et al. AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content , 2013, CCS.
[30] Michael T. Goodrich,et al. Practical oblivious storage , 2012, CODASPY '12.
[31] Ahmad-Reza Sadeghi,et al. TASTY: tool for automating secure two-party computations , 2010, CCS '10.
[32] Abhi Shelat,et al. Efficient Secure Computation with Garbled Circuits , 2011, ICISS.
[33] Adi Shamir,et al. Cache Attacks and Countermeasures: The Case of AES , 2006, CT-RSA.
[34] Danfeng Zhang,et al. Language-based control and mitigation of timing channels , 2012, PLDI.
[35] Craig Gentry,et al. Implementing Gentry's Fully-Homomorphic Encryption Scheme , 2011, EUROCRYPT.
[36] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[37] Stephen McCamant,et al. Loop-extended symbolic execution on binary programs , 2009, ISSTA.
[38] Jonathan Katz,et al. Faster Secure Two-Party Computation Using Garbled Circuits , 2011, USENIX Security Symposium.
[39] Elaine Shi,et al. Oblivious RAM with O((logN)3) Worst-Case Cost , 2011, ASIACRYPT.
[40] Abhi Shelat,et al. SCORAM: Oblivious RAM for Secure Computation , 2014, IACR Cryptol. ePrint Arch..
[41] Johan Agat,et al. Transforming out timing leaks , 2000, POPL '00.
[42] WilhelmReinhard,et al. The worst-case execution-time problemoverview of methods and survey of tools , 2008 .
[43] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[44] Marcel Keller,et al. Efficient, Oblivious Data Structures for MPC , 2014, IACR Cryptol. ePrint Arch..
[45] Thomas Ristenpart,et al. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.
[46] Carsten Willems,et al. Practical Timing Side Channel Attacks against Kernel Space ASLR , 2013, 2013 IEEE Symposium on Security and Privacy.
[47] Simon Kerl. A comprehensive grammar of the English language , .
[48] Richard E. Fairley,et al. Tutorial: Static Analysis and Dynamic Testing of Computer Software , 1978, Computer.
[49] Hovav Shacham,et al. Iago attacks: why the system call API is a bad untrusted RPC interface , 2013, ASPLOS '13.
[50] Wei-Ming Hu. Reducing Timing Channels with Fuzzy Time , 1992, J. Comput. Secur..
[51] Brian Rogers,et al. SecureME: a hardware-software approach to full system security , 2011, ICS '11.
[52] Elaine Shi,et al. Towards Practical Oblivious RAM , 2011, NDSS.
[53] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[54] Rui Wang,et al. Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow , 2010, 2010 IEEE Symposium on Security and Privacy.
[55] Helen J. Wang,et al. RandSys: Thwarting Code Injection Attacks with System Service Interface Randomization , 2007, 2007 26th IEEE International Symposium on Reliable Distributed Systems (SRDS 2007).
[56] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[57] Xiaoxin Chen,et al. Overshadow: a virtualization-based approach to retrofitting protection in commodity operating systems , 2008, ASPLOS.
[58] Srinivas Devadas,et al. Suppressing the Oblivious RAM timing channel while making information leakage and program efficiency trade-offs , 2014, 2014 IEEE 20th International Symposium on High Performance Computer Architecture (HPCA).
[59] Peter Williams,et al. PrivateFS: a parallel oblivious file system , 2012, CCS.
[60] Koen De Bosschere,et al. Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[61] Cynthia Dwork,et al. Differential Privacy , 2006, ICALP.
[62] Q. Uébec. DIFFERENTIALLY PRIVATE TRAFFIC PADDING FOR WEB APPLICATIONS , 2014 .
[63] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[64] David Schultz,et al. The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks , 2005, ICISC.
[65] Galen C. Hunt,et al. Shielding Applications from an Untrusted Cloud with Haven , 2014, OSDI.
[66] William Landi,et al. Undecidability of static analysis , 1992, LOPL.
[67] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[68] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[69] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..