메뉴 건너뛰기




Volumn 7771 LNCS, Issue , 2013, Pages 188-202

Memory access pattern protection for resource-constrained devices

Author keywords

Access Pattern Protection; Oblivious RAM; Shuffle Buffer

Indexed keywords

ACCESS PATTERNS; HARDWARE BUFFERS; MEMORY ACCESS PATTERNS; RESOURCECONSTRAINED DEVICES; SECURITY AND PERFORMANCE; SHUFFLE BUFFER; SOFTWARE EXECUTION; SPECIAL HARDWARE;

EID: 84875100141     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-37288-9_13     Document Type: Conference Paper
Times cited : (8)

References (21)
  • 1
    • 77954755618 scopus 로고    scopus 로고
    • Oblivious RAMs without cryptographic assumptions
    • Schulman, L.J. (ed.) ACM
    • Ajtai, M.: Oblivious RAMs without cryptographic assumptions. In: Schulman, L.J. (ed.) STOC, pp. 181-190. ACM (2010)
    • (2010) STOC , pp. 181-190
    • Ajtai, M.1
  • 3
    • 0029541045 scopus 로고
    • Private Information Retrieval
    • IEEE Computer Society
    • Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private Information Retrieval. In: FOCS, pp. 41-50. IEEE Computer Society (1995)
    • (1995) FOCS , pp. 41-50
    • Chor, B.1    Goldreich, O.2    Kushilevitz, E.3    Sudan, M.4
  • 4
    • 79953223285 scopus 로고    scopus 로고
    • Perfectly Secure Oblivious RAM without Random Oracles
    • Ishai, Y. (ed.) TCC 2011. Springer, Heidelberg
    • Damgård, I., Meldgaard, S., Nielsen, J.B.: Perfectly Secure Oblivious RAM without Random Oracles. In: Ishai, Y. (ed.) TCC 2011. LNCS, vol. 6597, pp. 144-163. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6597 , pp. 144-163
    • Damgård, I.1    Meldgaard, S.2    Nielsen, J.B.3
  • 5
    • 0023547498 scopus 로고
    • Towards a Theory of Software Protection and Simulation by Oblivious RAMs
    • Aho, A.V. (ed.) ACM
    • Goldreich, O.: Towards a Theory of Software Protection and Simulation by Oblivious RAMs. In: Aho, A.V. (ed.) STOC, pp. 182-194. ACM (1987)
    • (1987) STOC , pp. 182-194
    • Goldreich, O.1
  • 6
    • 0030149547 scopus 로고    scopus 로고
    • Software Protection and Simulation on Oblivious RAMs
    • Goldreich, O., Ostrovsky, R.: Software Protection and Simulation on Oblivious RAMs. J. ACM 43(3), 431-473 (1996)
    • (1996) J. ACM , vol.43 , Issue.3 , pp. 431-473
    • Goldreich, O.1    Ostrovsky, R.2
  • 7
    • 79959681766 scopus 로고    scopus 로고
    • Data-Oblivious External-Memory Algorithms for the Compaction, Selection, and Sorting of Outsourced Data
    • Rajaraman, R., Meyer auf der Heide, F. (eds.) ACM
    • Goodrich, M.T.: Data-Oblivious External-Memory Algorithms for the Compaction, Selection, and Sorting of Outsourced Data. In: Rajaraman, R., Meyer auf der Heide, F. (eds.) SPAA, pp. 379-388. ACM (2011)
    • (2011) SPAA , pp. 379-388
    • Goodrich, M.T.1
  • 8
    • 79960005023 scopus 로고    scopus 로고
    • Privacy-Preserving Access of Outsourced Data via Oblivious RAMSimulation
    • Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. Springer, Heidelberg
    • Goodrich, M.T., Mitzenmacher, M.: Privacy-Preserving Access of Outsourced Data via Oblivious RAMSimulation. In: Aceto, L., Henzinger, M., Sgall, J. (eds.) ICALP 2011, Part II. LNCS, vol. 6756, pp. 576-587. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6756 , pp. 576-587
    • Goodrich, M.T.1    Mitzenmacher, M.2
  • 9
    • 80955131283 scopus 로고    scopus 로고
    • Oblivious RAM simulation with Efficient Worst-Case Access Overhead
    • Cachin, C., Ristenpart, T. (eds.) ACM
    • Goodrich, M.T., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Oblivious RAM simulation with Efficient Worst-Case Access Overhead. In: Cachin, C., Ristenpart, T. (eds.) CCSW, pp. 95-100. ACM (2011)
    • (2011) CCSW , pp. 95-100
    • Goodrich, M.T.1    Mitzenmacher, M.2    Ohrimenko, O.3    Tamassia, R.4
  • 10
    • 84869401018 scopus 로고    scopus 로고
    • Practical Oblivious Storage
    • Bertino, E., Sandhu, R.S. (eds.) ACM
    • Goodrich, M.T., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Practical Oblivious Storage. In: Bertino, E., Sandhu, R.S. (eds.) CODASPY, pp. 13-24. ACM (2012)
    • (2012) CODASPY , pp. 13-24
    • Goodrich, M.T.1    Mitzenmacher, M.2    Ohrimenko, O.3    Tamassia, R.4
  • 11
    • 84860169197 scopus 로고    scopus 로고
    • Privacy-Preserving Group Data Access via Stateless Oblivious RAM Simulation
    • Rabani, Y. (ed.) SIAM
    • Goodrich, M.T., Mitzenmacher, M., Ohrimenko, O., Tamassia, R.: Privacy-Preserving Group Data Access via Stateless Oblivious RAM Simulation. In: Rabani, Y. (ed.) SODA, pp. 157-167. SIAM (2012)
    • (2012) SODA , pp. 157-167
    • Goodrich, M.T.1    Mitzenmacher, M.2    Ohrimenko, O.3    Tamassia, R.4
  • 12
    • 84860181777 scopus 로고    scopus 로고
    • On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme
    • Randall, D. (ed.) SIAM
    • Kushilevitz, E., Lu, S., Ostrovsky, R.: On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme. In: Randall, D. (ed.) SODA, pp. 143-156. SIAM (2012)
    • (2012) SODA , pp. 143-156
    • Kushilevitz, E.1    Lu, S.2    Ostrovsky, R.3
  • 14
    • 84875106434 scopus 로고    scopus 로고
    • Distributed Oblivious RAM for Secure Two-Party Computation
    • Lu, S., Ostrovsky, R.: Distributed Oblivious RAM for Secure Two-Party Computation. IACR Cryptology ePrint Archive, 2011:384 (2011)
    • (2011) IACR Cryptology ePrint Archive , vol.2011 , pp. 384
    • Lu, S.1    Ostrovsky, R.2
  • 16
    • 77957007201 scopus 로고    scopus 로고
    • Oblivious RAM Revisited
    • Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
    • Pinkas, B., Reinman, T.: Oblivious RAM Revisited. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 502-519. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6223 , pp. 502-519
    • Pinkas, B.1    Reinman, T.2
  • 17
    • 82955173838 scopus 로고    scopus 로고
    • 3) Worst-Case Cost
    • Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. Springer, Heidelberg
    • 3) Worst-Case Cost. In: Lee, D.H., Wang, X. (eds.) ASIACRYPT 2011. LNCS, vol. 7073, pp. 197-214. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.7073 , pp. 197-214
    • Shi, E.1    Chan, T.-H.H.2    Stefanov, E.3    Li, M.4
  • 18
    • 80955132243 scopus 로고    scopus 로고
    • Towards Practical Oblivious RAM
    • abs/1106.3652
    • Stefanov, E., Shi, E., Song, D.: Towards Practical Oblivious RAM. CoRR, abs/1106.3652 (2011)
    • (2011) CoRR
    • Stefanov, E.1    Shi, E.2    Song, D.3
  • 19
    • 85180787079 scopus 로고    scopus 로고
    • Usable PIR
    • The Internet Society
    • Williams, P., Sion, R.: Usable PIR. In: NDSS. The Internet Society (2008)
    • (2008) NDSS
    • Williams, P.1    Sion, R.2
  • 20
    • 84875099300 scopus 로고    scopus 로고
    • SR-ORAM: Single Round-trip Oblivious RAM
    • Industrial Track
    • Williams, P., Sion, R.: SR-ORAM: Single Round-trip Oblivious RAM. In: ACNS, Industrial Track, pp. 19-33 (2012)
    • (2012) ACNS , pp. 19-33
    • Williams, P.1    Sion, R.2
  • 21
    • 29144444415 scopus 로고    scopus 로고
    • Hardware Assisted Control Flow Obfuscation for Embedded Processors
    • Irwin, M.J., Zhao, W., Lavagno, L., Mahlke, S.A. (eds.) ACM
    • Zhuang, X., Zhang, T., Lee, H.-H.S., Pande, S.: Hardware Assisted Control Flow Obfuscation for Embedded Processors. In: Irwin, M.J., Zhao, W., Lavagno, L., Mahlke, S.A. (eds.) CASES, pp. 292-302. ACM (2004)
    • (2004) CASES , pp. 292-302
    • Zhuang, X.1    Zhang, T.2    Lee, H.-H.S.3    Pande, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.