Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2024
A Tensor Compiler with Automatic Data Packing for Simple and Efficient Fully Homomorphic Encryption
Proceedings of the ACM on Programming Languages (PACMPL), Volume 8, Issue PLDIArticle No.: 152, Pages 126–150https://doi.org/10.1145/3656382Fully Homomorphic Encryption (FHE) enables computing on encrypted data, letting clients securely offload computation to untrusted servers. While enticing, FHE has two key challenges that limit its applicability: it has high performance overheads (10,000× ...
- research-articleNovember 2023
Geometry of Sensitivity: Twice Sampling and Hybrid Clipping in Differential Privacy with Optimal Gaussian Noise and Application to Deep Learning
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 2636–2650https://doi.org/10.1145/3576915.3623142We study the fundamental problem of the construction of optimal randomization in Differential Privacy (DP). Depending on the clipping strategy or additional properties of the processing function, the corresponding sensitivity set theoretically determines ...
- research-articleAugust 2023
Remote direct memory introspection
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 338, Pages 6043–6060Hypervisors have played a critical role in cloud security, but they introduce a large trusted computing base (TCB) and incur a heavy performance tax. As of late, hypervisor offloading has become an emerging trend, where privileged functions are sunk into ...
- research-articleNovember 2023
Robust Near-Optimal Arm Identification With Strongly-Adaptive Adversaries
IEEE Transactions on Signal Processing (TSP), Volume 71Pages 4257–4272https://doi.org/10.1109/TSP.2023.3330009In this work, we study the best arm identification problem in the adversarial multi-armed bandits framework. We define a strongly-adaptive adversarial model in this framework, based on strongly-adaptive adversaries in security and distributed systems. On ...
-
- short-paperNovember 2022
Designing Hardware for Cryptography and Cryptography for Hardware
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 1–4https://doi.org/10.1145/3548606.3559393There have been few high-impact deployments of hardware implementations of cryptographic primitives. We present the benefits and challenges of hardware acceleration of sophisticated cryptographic primitives and protocols, and briefly describe our recent ...
- research-articleJuly 2022
An Architecture to Accelerate Computation on Encrypted Data
- Axel Feldmann,
- Nikola Samardzic,
- Aleksandar Krastev,
- Srinivas Devadas,
- Ron Dreslinski,
- Chris Peikert,
- Daniel Sanchez
Fully homomorphic encryption (FHE) allows computing on encrypted data, enabling secure offloading of computation to untrusted servers. Though it provides ideal security, FHE is prohibitively expensive when executed in software. These overheads are a major ...
- research-articleJune 2022
CraterLake: a hardware accelerator for efficient unbounded computation on encrypted data
- Nikola Samardzic,
- Axel Feldmann,
- Aleksandar Krastev,
- Nathan Manohar,
- Nicholas Genise,
- Srinivas Devadas,
- Karim Eldefrawy,
- Chris Peikert,
- Daniel Sanchez
ISCA '22: Proceedings of the 49th Annual International Symposium on Computer ArchitecturePages 173–187https://doi.org/10.1145/3470496.3527393Fully Homomorphic Encryption (FHE) enables offloading computation to untrusted servers with cryptographic privacy. Despite its attractive security, FHE is not yet widely adopted due to its prohibitive overheads, about 10,000X over unencrypted ...
- research-articleJune 2022
Litmus: Towards a Practical Database Management System with Verifiable ACID Properties and Transaction Correctness
SIGMOD '22: Proceedings of the 2022 International Conference on Management of DataPages 1478–1492https://doi.org/10.1145/3514221.3517851Existing secure database management systems (DBMSs) focus on security and privacy of data but overlook semantic properties, such as the correctness and ACID properties of transactions. Enforcing these properties is crucial to the functionality of ...
- research-articleOctober 2021
F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption
- Nikola Samardzic,
- Axel Feldmann,
- Aleksandar Krastev,
- Srinivas Devadas,
- Ronald Dreslinski,
- Christopher Peikert,
- Daniel Sanchez
MICRO '21: MICRO-54: 54th Annual IEEE/ACM International Symposium on MicroarchitecturePages 238–252https://doi.org/10.1145/3466752.3480070Fully Homomorphic Encryption (FHE) allows computing on encrypted data, enabling secure offloading of computation to untrusted servers. Though it provides ideal security, FHE is expensive when executed in software, 4 to 5 orders of magnitude slower than ...
- ArticleApril 2021
Robomorphic computing: a design methodology for domain-specific accelerators parameterized by robot morphology
ASPLOS '21: Proceedings of the 26th ACM International Conference on Architectural Support for Programming Languages and Operating SystemsPages 674–686https://doi.org/10.1145/3445814.3446746Robotics applications have hard time constraints and heavy computational burdens that can greatly benefit from domain-specific hardware accelerators. For the latency-critical problem of robot motion planning and control, there exists a performance gap ...
- ArticleNovember 2020
- research-articleOctober 2020
Taurus: lightweight parallel logging for in-memory database management systems
Proceedings of the VLDB Endowment (PVLDB), Volume 14, Issue 2Pages 189–201https://doi.org/10.14778/3425879.3425889Existing single-stream logging schemes are unsuitable for in-memory database management systems (DBMSs) as the single log is often a performance bottleneck. To overcome this problem, we present Taurus, an efficient parallel logging scheme that uses ...
- research-articleAugust 2020
A Retrospective on Path ORAM
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (TCADICS), Volume 39, Issue 8Pages 1572–1576https://doi.org/10.1109/TCAD.2019.2925398Path oblivious RAM (ORAM) is an ORAM protocol that simultaneously enjoys simplicity and efficiency. As a result, it holds promise to provide cryptographic-grade and practical access pattern protection in multiple application domains, including but not ...
- research-articleJuly 2020
On differentially private stochastic convex optimization with heavy-tailed data
ICML'20: Proceedings of the 37th International Conference on Machine LearningArticle No.: 935, Pages 10081–10091In this paper, we consider the problem of designing Differentially Private (DP) algorithms for Stochastic Convex Optimization (SCO) on heavy-tailed data. The irregularity of such data violates some key assumptions used in almost all existing DP-SCO and DP-...
- ArticleFebruary 2020
XRD: scalable messaging system with cryptographic privacy
NSDI'20: Proceedings of the 17th Usenix Conference on Networked Systems Design and ImplementationPages 759–776Even as end-to-end encrypted communication becomes more popular, private messaging remains a challenging problem due to metadata leakages, such as who is communicating with whom. Most existing systems that hide communication metadata either (1) do not ...
- research-articleNovember 2019
Transparency Logs via Append-Only Authenticated Dictionaries
- Alin Tomescu,
- Vivek Bhupatiraju,
- Dimitrios Papadopoulos,
- Charalampos Papamanthou,
- Nikos Triandopoulos,
- Srinivas Devadas
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 1299–1316https://doi.org/10.1145/3319535.3345652Transparency logs allow users to audit a potentially malicious service, paving the way towards a more accountable Internet. For example, Certificate Transparency (CT) enables domain owners to audit Certificate Authorities (CAs) and detect impersonation ...
- research-articleNovember 2019
Benchmarking and Workload Analysis of Robot Dynamics Algorithms
2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)Pages 5235–5242https://doi.org/10.1109/IROS40897.2019.8967694Rigid body dynamics calculations are needed for many tasks in robotics, including online control. While there currently exist several competing software implementations that are sufficient for use in traditional control approaches, emerging sophisticated ...
- research-articleOctober 2019
MI6: Secure Enclaves in a Speculative Out-of-Order Processor
MICRO '52: Proceedings of the 52nd Annual IEEE/ACM International Symposium on MicroarchitecturePages 42–56https://doi.org/10.1145/3352460.3358310Recent attacks have broken process isolation by exploiting microarchitectural side channels that allow indirect access to shared microarchitectural state. Enclaves strengthen the process abstraction to restore isolation guarantees.
We propose MI6, an ...