메뉴 건너뛰기




Volumn , Issue , 2013, Pages 311-324

PHANTOM: Practical oblivious computation in a secure processor

Author keywords

fpgas; oblivious ram; path oram; secure processors

Indexed keywords

EMPIRICAL MODEL; HARDWARE IMPLEMENTATIONS; MEMORY CHANNELS; MEMORY CONTROLLER; OFFLOADING COMPUTATIONS; PATH ORAM; SECURE PROCESSORS; STORAGE REQUIREMENTS;

EID: 84889002819     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2508859.2516692     Document Type: Conference Paper
Times cited : (185)

References (42)
  • 1
    • 84889046401 scopus 로고    scopus 로고
    • "PrivateCore," http://www.privatecore.com/.
    • PrivateCore
  • 2
    • 0033702592 scopus 로고    scopus 로고
    • Transforming out Timing Leaks
    • J. Agat, "Transforming out Timing Leaks," in POPL, 2000.
    • (2000) POPL
    • Agat, J.1
  • 3
    • 78650017523 scopus 로고    scopus 로고
    • Predictive black-box mitigation of timing channels
    • A. Askarov, D. Zhang, and A. C. Myers, "Predictive black-box mitigation of timing channels," in CCS, 2010.
    • (2010) CCS
    • Askarov, A.1    Zhang, D.2    Myers, A.C.3
  • 4
    • 78650158728 scopus 로고    scopus 로고
    • Determinating Timing Channels in Compute Clouds
    • A. Aviram, S. Hu, B. Ford, and R. Gummadi, "Determinating Timing Channels in Compute Clouds," in CCSW, 2010.
    • (2010) CCSW
    • Aviram, A.1    Hu, S.2    Ford, B.3    Gummadi, R.4
  • 7
    • 70449623154 scopus 로고    scopus 로고
    • Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors
    • B. Coppens, I. Verbauwhede, K. D. Bosschere, and B. D. Sutter, "Practical Mitigations for Timing-Based Side-Channel Attacks on Modern x86 Processors," in SP, 2009.
    • (2009) SP
    • Coppens, B.1    Verbauwhede, I.2    Bosschere, K.D.3    Sutter, B.D.4
  • 8
    • 67650035136 scopus 로고    scopus 로고
    • DMP: Deterministic Shared Memory Multiprocessing
    • J. Devietti, B. Lucia, L. Ceze, and M. Oskin, "DMP: Deterministic Shared Memory Multiprocessing," in ASPLOS, 2009.
    • (2009) ASPLOS
    • Devietti, J.1    Lucia, B.2    Ceze, L.3    Oskin, M.4
  • 9
    • 84881225045 scopus 로고    scopus 로고
    • A Secure Processor Architecture for Encrypted Computation on Untrusted Programs
    • C. W. Fletcher, M. v. Dijk, and S. Devadas, "A Secure Processor Architecture for Encrypted Computation on Untrusted Programs," in STC, 2012.
    • (2012) STC
    • Fletcher, C.W.1    Dijk, M.V.2    Devadas, S.3
  • 11
    • 0023547498 scopus 로고
    • Towards a Theory of Software Protection and Simulation by Oblivious RAMs
    • O. Goldreich, "Towards a Theory of Software Protection and Simulation by Oblivious RAMs," in STOC, 1987.
    • (1987) STOC
    • Goldreich, O.1
  • 12
    • 0030149547 scopus 로고    scopus 로고
    • Software Protection and Simulation on Oblivious RAMs
    • O. Goldreich and R. Ostrovsky, "Software Protection and Simulation on Oblivious RAMs," J. ACM, 1996.
    • (1996) J. ACM
    • Goldreich, O.1    Ostrovsky, R.2
  • 13
    • 84881228714 scopus 로고    scopus 로고
    • Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation
    • M. T. Goodrich and M. Mitzenmacher, "Privacy-Preserving Access of Outsourced Data via Oblivious RAM Simulation," in ICALP, 2011.
    • (2011) ICALP
    • Goodrich, M.T.1    Mitzenmacher, M.2
  • 14
    • 84860169197 scopus 로고    scopus 로고
    • Privacy-preserving Group Data Access via Stateless Oblivious RAM Simulation
    • M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia, "Privacy-preserving Group Data Access via Stateless Oblivious RAM Simulation," in SODA, 2012.
    • (2012) SODA
    • Goodrich, M.T.1    Mitzenmacher, M.2    Ohrimenko, O.3    Tamassia, R.4
  • 15
    • 84870525044 scopus 로고    scopus 로고
    • OS-Sommelier: Memory-only Operating System Fingerprinting in the Cloud
    • Y. Gu, Y. Fu, A. Prakash, Z. Lin, and H. Yin, "OS-Sommelier: Memory-only Operating System Fingerprinting in the Cloud," in SoCC, 2012.
    • (2012) SoCC
    • Gu, Y.1    Fu, Y.2    Prakash, A.3    Lin, Z.4    Yin, H.5
  • 18
    • 18644367181 scopus 로고    scopus 로고
    • A 21.54 Gbits/s Fully Pipelined AES Processor on FPGA
    • A. Hodjat and I. Verbauwhede, "A 21.54 Gbits/s Fully Pipelined AES Processor on FPGA," in FCCM, 2004.
    • (2004) FCCM
    • Hodjat, A.1    Verbauwhede, I.2
  • 19
    • 0742293360 scopus 로고    scopus 로고
    • Keeping Secrets in Hardware: The Microsoft Xbox Case Study
    • A. Huang, "Keeping Secrets in Hardware: The Microsoft Xbox Case Study," in CHES, 2002.
    • (2002) CHES
    • Huang, A.1
  • 21
    • 84860181777 scopus 로고    scopus 로고
    • On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme
    • E. Kushilevitz, S. Lu, and R. Ostrovsky, "On the (In)security of Hash-based Oblivious RAM and a New Balancing Scheme," in SODA, 2012.
    • (2012) SODA
    • Kushilevitz, E.1    Lu, S.2    Ostrovsky, R.3
  • 22
    • 84890416103 scopus 로고    scopus 로고
    • Shroud: Ensuring Private Access to Large-Scale Data in the Data Center
    • J. R. Lorch and B. Parno, "Shroud: Ensuring Private Access to Large-Scale Data in the Data Center," in FAST, 2013.
    • (2013) FAST
    • Lorch, J.R.1    Parno, B.2
  • 23
    • 84864837138 scopus 로고    scopus 로고
    • TimeWarp: Rethinking Timekeeping and Performance Monitoring Mechanisms to Mitigate Side-channel Attacks
    • R. Martin, J. Demme, and S. Sethumadhavan, "TimeWarp: Rethinking Timekeeping and Performance Monitoring Mechanisms to Mitigate Side-channel Attacks," in ISCA, 2012.
    • (2012) ISCA
    • Martin, R.1    Demme, J.2    Sethumadhavan, S.3
  • 24
    • 0030714231 scopus 로고    scopus 로고
    • Private Information Storage
    • Extended Abstract
    • R. Ostrovsky and V. Shoup, "Private Information Storage (Extended Abstract)," in STOC, 1997.
    • (1997) STOC
    • Ostrovsky, R.1    Shoup, V.2
  • 26
    • 84881169695 scopus 로고    scopus 로고
    • Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors
    • L. Ren, X. Yu, C. W. Fletcher, M. van Dijk, and S. Devadas, "Design Space Exploration and Optimization of Path Oblivious RAM in Secure Processors," in ISCA, 2013.
    • (2013) ISCA
    • Ren, L.1    Yu, X.2    Fletcher, C.W.3    Van Dijk, M.4    Devadas, S.5
  • 27
    • 47349124111 scopus 로고    scopus 로고
    • Using address independent seed encryption and bonsai merkle trees to make secure processors os- and performance-friendly
    • B. Rogers, S. Chhabra, M. Prvulovic, and Y. Solihin, "Using address independent seed encryption and bonsai merkle trees to make secure processors os- and performance-friendly," in MICRO, 2007.
    • (2007) MICRO
    • Rogers, B.1    Chhabra, S.2    Prvulovic, M.3    Solihin, Y.4
  • 29
    • 17444403861 scopus 로고    scopus 로고
    • Outbound Authentication for Programmable Secure Coprocessors
    • S. W. Smith, "Outbound Authentication for Programmable Secure Coprocessors," in ESORICS, 2002.
    • (2002) ESORICS
    • Smith, S.W.1
  • 30
    • 84881250193 scopus 로고    scopus 로고
    • Oblivistore: High performance oblivious cloud storage
    • E. Stefanov and E. Shi, "Oblivistore: High performance oblivious cloud storage," in S & P, 2013.
    • (2013) S & P
    • Stefanov, E.1    Shi, E.2
  • 31
    • 85180805635 scopus 로고    scopus 로고
    • Towards Practical Oblivious RAM
    • E. Stefanov, E. Shi, and D. Song, "Towards Practical Oblivious RAM," in NDSS, 2012.
    • (2012) NDSS
    • Stefanov, E.1    Shi, E.2    Song, D.3
  • 33
    • 1142280988 scopus 로고    scopus 로고
    • AEGIS: Architecture for Tamper-evident and Tamper-resistant Processing
    • G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas, "AEGIS: Architecture for Tamper-evident and Tamper-resistant Processing," in ICS, 2003.
    • (2003) ICS
    • Suh, G.E.1    Clarke, D.2    Gassend, B.3    Van Dijk, M.4    Devadas, S.5
  • 36
    • 80051995886 scopus 로고    scopus 로고
    • Silencing Hardware Backdoors
    • A. Waksman and S. Sethumadhavan, "Silencing Hardware Backdoors," in SP, 2011.
    • (2011) SP
    • Waksman, A.1    Sethumadhavan, S.2
  • 38
    • 84881256639 scopus 로고    scopus 로고
    • Round-Optimal Access Privacy on Outsourced Storage
    • P. Williams and R. Sion, "Round-Optimal Access Privacy on Outsourced Storage," in CCS, 2012.
    • (2012) CCS
    • Williams, P.1    Sion, R.2
  • 39
    • 70349278621 scopus 로고    scopus 로고
    • Building castles out of mud: Practical access pattern privacy and correctness on untrusted storage
    • P. Williams, R. Sion, and B. Carbunar, "Building castles out of mud: practical access pattern privacy and correctness on untrusted storage," in CCS, 2008.
    • (2008) CCS
    • Williams, P.1    Sion, R.2    Carbunar, B.3
  • 40
    • 84869453208 scopus 로고    scopus 로고
    • PrivateFS: A Parallel Oblivious File System
    • P. Williams, R. Sion, and A. Tomescu, "PrivateFS: A Parallel Oblivious File System," in CCS, 2012.
    • (2012) CCS
    • Williams, P.1    Sion, R.2    Tomescu, A.3
  • 41
    • 80755187785 scopus 로고    scopus 로고
    • Predictive Mitigation of Timing Channels in Interactive Systems
    • D. Zhang, A. Askarov, and A. C. Myers, "Predictive Mitigation of Timing Channels in Interactive Systems," in CCS, 2011.
    • (2011) CCS
    • Zhang, D.1    Askarov, A.2    Myers, A.C.3
  • 42
    • 12844260675 scopus 로고    scopus 로고
    • HIDE: An Infrastructure for Efficiently Protecting Information Leakage on the Address Bus
    • X. Zhuang, T. Zhang, and S. Pande, "HIDE: An Infrastructure for Efficiently Protecting Information Leakage on the Address Bus," in ASPLOS, 2004.
    • (2004) ASPLOS
    • Zhuang, X.1    Zhang, T.2    Pande, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.