Cloud computing allows users to delegate data and computation to cloud service providers, at the cost of giving up physical control of their computing infrastructure. An attacker (e.g., insider) with physical access to the computing platform can perform various physical attacks, including probing memory buses and cold-boot style attacks. Previous work on secure (co-)processors provides hardware support for memory encryption and prevents direct leakage of sensitive data over the memory bus. However, an adversary snooping on the bus can still infer sensitive information from the memory access traces. Existing work on Oblivious RAM (ORAM) provides a solution for users to put all data in an ORAM; and accesses to an ORAM are obfusc...
Cloud storage services are becoming more widely used in recent decades. Lots of systems can protect ...
The rapid increase in the amount of data stored by cloud servers has resulted in growing privacy con...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Abstract—Cloud computing allows users to delegate data and computation to cloud service providers, a...
This paper presents a new, co-designed compiler and archi-tecture called GhostRider for supporting p...
The big data era has dramatically transformed our lives; however, security incidents such as data br...
When multiple users and applications share the resources on cloud servers, information may be leaked...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. On...
Oblivious RAM (ORAM) is an established cryptographic technique to hide a program's address pattern t...
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely access untru...
We are among the first to systematically investigate (memory-trace) oblivious data struc-tures. We p...
Abstract. Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely ac...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One...
Computation outsourcing to a cloud cluster has become a common practice in today’s world. Unlike tra...
Remote storage of data has become an increasingly attractive and advantageous option, especially due...
Cloud storage services are becoming more widely used in recent decades. Lots of systems can protect ...
The rapid increase in the amount of data stored by cloud servers has resulted in growing privacy con...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
Abstract—Cloud computing allows users to delegate data and computation to cloud service providers, a...
This paper presents a new, co-designed compiler and archi-tecture called GhostRider for supporting p...
The big data era has dramatically transformed our lives; however, security incidents such as data br...
When multiple users and applications share the resources on cloud servers, information may be leaked...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. On...
Oblivious RAM (ORAM) is an established cryptographic technique to hide a program's address pattern t...
Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely access untru...
We are among the first to systematically investigate (memory-trace) oblivious data struc-tures. We p...
Abstract. Oblivious RAM (ORAM) is a cryptographic primitive that allows a trusted CPU to securely ac...
Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One...
Computation outsourcing to a cloud cluster has become a common practice in today’s world. Unlike tra...
Remote storage of data has become an increasingly attractive and advantageous option, especially due...
Cloud storage services are becoming more widely used in recent decades. Lots of systems can protect ...
The rapid increase in the amount of data stored by cloud servers has resulted in growing privacy con...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...