-
1
-
-
85179556059
-
Access pattern disclosure on searchable encryption: Ramification, attack and mitigation
-
M. Islam, M. Kuzu, and M. Kantarcioglu, "Access pattern disclosure on searchable encryption: Ramification, attack and mitigation," in Network and Distributed System Security Symposium (NDSS), 2012.
-
(2012)
Network and Distributed System Security Symposium (NDSS)
-
-
Islam, M.1
Kuzu, M.2
Kantarcioglu, M.3
-
2
-
-
12844260675
-
HIDE: An infrastructure for efficiently protecting information leakage on the address bus
-
X. Zhuang, T. Zhang, and S. Pande, "HIDE: an infrastructure for efficiently protecting information leakage on the address bus," in Proceedings of the 11th ASPLOS, 2004.
-
(2004)
Proceedings of the 11th ASPLOS
-
-
Zhuang, X.1
Zhang, T.2
Pande, S.3
-
3
-
-
0030149547
-
Software protection and simulation on oblivious rams
-
O. Goldreich and R. Ostrovsky, "Software protection and simulation on oblivious rams," in J. ACM, 1996.
-
(1996)
J. ACM
-
-
Goldreich, O.1
Ostrovsky, R.2
-
4
-
-
0030714231
-
Private information storage (extended abstract)
-
R. Ostrovsky and V. Shoup, "Private information storage (extended abstract)," in STOC, 1997, pp. 294-303.
-
(1997)
STOC
, pp. 294-303
-
-
Ostrovsky, R.1
Shoup, V.2
-
5
-
-
82955198779
-
Efficient computation on oblivious rams
-
R. Ostrovsky, "Efficient computation on oblivious rams," in STOC, 1990.
-
(1990)
STOC
-
-
Ostrovsky, R.1
-
6
-
-
82955204091
-
Perfectly secure oblivious RAM without random oracles
-
I. Damg?ard, S. Meldgaard, and J. B. Nielsen, "Perfectly secure oblivious RAM without random oracles," in TCC, 2011.
-
(2011)
TCC
-
-
Damgard, I.1
Meldgaard, S.2
Nielsen, J.B.3
-
7
-
-
84893480001
-
Remote oblivious storage: Making oblivious RAM practical
-
D. Boneh, D. Mazieres, and R. A. Popa, "Remote oblivious storage: Making oblivious RAM practical," Manuscript, http://dspace. mit. edu/bitstream/handle/1721. 1/62006/MIT-CSAILTR-2011-018. pdf, 2011.
-
(2011)
Manuscript
-
-
Boneh, D.1
Mazieres, D.2
Popa, R.A.3
-
8
-
-
84860169197
-
Privacy-preserving group data access via stateless oblivious RAM simulation
-
M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia, "Privacy-preserving group data access via stateless oblivious RAM simulation," in SODA, 2012.
-
(2012)
SODA
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
9
-
-
84860181777
-
On the (in)security of hashbased oblivious RAM and a new balancing scheme
-
E. Kushilevitz, S. Lu, and R. Ostrovsky, "On the (in)security of hashbased oblivious RAM and a new balancing scheme," in SODA, 2012.
-
(2012)
SODA
-
-
Kushilevitz, E.1
Lu, S.2
Ostrovsky, R.3
-
10
-
-
84881256639
-
Round-optimal access privacy on outsourced storage
-
P. Williams and R. Sion, "Round-optimal access privacy on outsourced storage," in CCS, 2012.
-
(2012)
CCS
-
-
Williams, P.1
Sion, R.2
-
11
-
-
84869401018
-
Practical oblivious storage
-
M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia, "Practical oblivious storage," in CODASPY, 2012.
-
(2012)
CODASPY
-
-
Goodrich, M.T.1
Mitzenmacher, M.2
Ohrimenko, O.3
Tamassia, R.4
-
12
-
-
82955173838
-
Oblivious ram with o((log n)3) worst-case cost
-
E. Shi, T.-H. H. Chan, E. Stefanov, and M. Li, "Oblivious ram with o((log n)3) worst-case cost," in Asiacrypt, 2011, pp. 197-214.
-
(2011)
Asiacrypt
, pp. 197-214
-
-
Shi, E.1
Chan, T.-H.H.2
Stefanov, E.3
Li, M.4
-
13
-
-
85180805635
-
Towards practical oblivious RAM
-
E. Stefanov, E. Shi, and D. Song, "Towards practical oblivious RAM," in NDSS, 2012.
-
(2012)
NDSS
-
-
Stefanov, E.1
Shi, E.2
Song, D.3
-
15
-
-
84869473022
-
-
Cornell University Library, arXiv:1202. 5150v2, 2013, arxiv. org/abs/1202. 5150, to appear in CCS
-
E. Stefanov, M. van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas, "Path O-RAM: An Extremely Simple Oblivious RAM Protocol," Cornell University Library, arXiv:1202. 5150v2, 2013, arxiv. org/abs/1202. 5150, to appear in CCS 2013.
-
(2013)
Path O-RAM: An Extremely Simple Oblivious RAM Protocol
-
-
Stefanov, E.1
Van Dijk, M.2
Shi, E.3
Fletcher, C.4
Ren, L.5
Yu, X.6
Devadas, S.7
-
17
-
-
4444322842
-
Specifying and verifying hardware for tamper-resistant software
-
D. Lie, J. Mitchell, C. Thekkath, and M. Horowitz, "Specifying and verifying hardware for tamper-resistant software," in Proceedings of the IEEE Symposium on Security and Privacy, 2003.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Lie, D.1
Mitchell, J.2
Thekkath, C.3
Horowitz, M.4
-
18
-
-
21644458439
-
Implementing an untrusted operating system on trusted hardware
-
D. Lie, C. Thekkath, and M. Horowitz, "Implementing an untrusted operating system on trusted hardware," in Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles, 2003, pp. 178-192.
-
(2003)
Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles
, pp. 178-192
-
-
Lie, D.1
Thekkath, C.2
Horowitz, M.3
-
19
-
-
0034445599
-
Architectural support for copy and tamper resistant software
-
November
-
D. Lie, C. Thekkath, M. Mitchell, P. Lincoln, D. Boneh, J. Mitchell, and M. Horowitz, "Architectural Support for Copy and Tamper Resistant Software," in Proceedings of the 9th Int'l Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOSIX), November 2000, pp. 168-177.
-
(2000)
Proceedings of the 9th Int'l Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOSIX)
, pp. 168-177
-
-
Lie, D.1
Thekkath, C.2
Mitchell, M.3
Lincoln, P.4
Boneh, D.5
Mitchell, J.6
Horowitz, M.7
-
20
-
-
1142280988
-
AEGIS: Architecture for tamper-evident and tamper-resistant processing
-
New-York: ACM, June (revised one)
-
G. E. Suh, D. Clarke, B. Gassend, M. van Dijk, and S. Devadas, " AEGIS: Architecture for Tamper-Evident and Tamper-Resistant Processing," in Proceedings of the 17th ICS (MIT-CSAIL-CSGMemo-474 is an updated version). New-York: ACM, June 2003 [Online]. Available: http://csg. csail. mit. edu/pubs/memos/Memo-474/Memo-474. pdf (revised one)
-
(2003)
Proceedings of the 17th ICS (MIT-CSAIL-CSGMemo-474 Is An Updated Version)
-
-
Suh, G.E.1
Clarke, D.2
Gassend, B.3
Van Dijk, M.4
Devadas, S.5
-
21
-
-
27544441530
-
Design and implementation of the aegis single-chip secure processor using physical random functions
-
New-York: ACM, June
-
G. E. Suh, C. W. O'Donnell, I. Sachdev, and S. Devadas, "Design and Implementation of the AEGIS Single-Chip Secure Processor Using Physical Random Functions," in Proceedings of the 32nd ISCA'05. New-York: ACM, June 2005 [Online]. Available: http://csg. csail. mit. edu/pubs/memos/Memo-483/Memo-483. pdf
-
(2005)
Proceedings of the 32nd ISCA'05
-
-
Suh, G.E.1
O'Donnell, C.W.2
Sachdev, I.3
Devadas, S.4
-
22
-
-
84869402047
-
Secure processor architecture for encrypted computation on untrusted programs
-
Oct.
-
C. Fletcher, M. van Dijk, and S. Devadas, "Secure Processor Architecture for Encrypted Computation on Untrusted Programs," in Proceedings of the 7th ACM CCS Workshop on Scalable Trusted Computing, Oct. 2012, pp. 3-8.
-
(2012)
Proceedings of the 7th ACM CCS Workshop on Scalable Trusted Computing
, pp. 3-8
-
-
Fletcher, C.1
Van Dijk, M.2
Devadas, S.3
-
23
-
-
84881168098
-
Ascend: An architecture for performing secure computation on encrypted data
-
(Master's thesis), April
-
C. W. Fletcher, "Ascend: An architecture for performing secure computation on encrypted data," in MIT CSAIL CSG Technical Memo 508 (Master's thesis), April 2013 [Online]. Available: http://csg. csail. mit. edu/pubs/memos/Memo-508/Memo-508. pdf
-
(2013)
MIT CSAIL CSG Technical Memo 508
-
-
Fletcher, C.W.1
-
25
-
-
84875090679
-
Toward practical private access to data centers via parallel oram
-
informal publication
-
J. R. Lorch, J. W. Mickens, B. Parno, M. Raykova, and J. Schiffman, "Toward practical private access to data centers via parallel oram. " IACR Cryptology ePrint Archive, vol. 2012, p. 133, 2012, informal publication [Online]. Available: http://dblp. unitrier. de/db/journals/iacr/iacr2012. html#LorchMPRS12
-
(2012)
IACR Cryptology EPrint Archive
, vol.2012
, pp. 133
-
-
Lorch, J.R.1
Mickens, J.W.2
Parno, B.3
Raykova, M.4
Schiffman, J.5
-
26
-
-
84881169695
-
Design space exploration and optimization of path oblivious ram in secure processors
-
June, available at Cryptology ePrint Archive, Report 2012/76
-
L. Ren, X. Yu, C. Fletcher, M. van Dijk, and S. Devadas, "Design space exploration and optimization of path oblivious ram in secure processors," in Proceedings of the Int'l Symposium on Computer Architecture, June 2013, available at Cryptology ePrint Archive, Report 2012/76.
-
(2013)
Proceedings of the Int'l Symposium on Computer Architecture
-
-
Ren, L.1
Yu, X.2
Fletcher, C.3
Van Dijk, M.4
Devadas, S.5
-
27
-
-
79959550547
-
Dramsim2: A cycle accurate memory system simulator
-
jan.-june
-
P. Rosenfeld, E. Cooper-Balis, and B. Jacob, "Dramsim2: A cycle accurate memory system simulator," Computer Architecture Letters, vol. 10, no. 1, pp. 16-19, jan.-june 2011.
-
(2011)
Computer Architecture Letters
, vol.10
, Issue.1
, pp. 16-19
-
-
Rosenfeld, P.1
Cooper-Balis, E.2
Jacob, B.3
-
28
-
-
84955507265
-
Caches and merkle trees for efficient memory integrity verification
-
New-York: IEEE, February
-
B. Gassend, G. E. Suh, D. Clarke, M. van Dijk, and S. Devadas, "Caches and Merkle Trees for Efficient Memory Integrity Verification," in Proceedings of Ninth International Symposium on High Performance Computer Architecture. New-York: IEEE, February 2003.
-
(2003)
Proceedings of Ninth International Symposium on High Performance Computer Architecture
-
-
Gassend, B.1
Suh, G.E.2
Clarke, D.3
Van Dijk, M.4
Devadas, S.5
|