Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/CSF.2013.11guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Memory Trace Oblivious Program Execution

Published: 26 June 2013 Publication History

Abstract

Cloud computing allows users to delegate data and computation to cloud service providers, at the cost of giving up physical control of their computing infrastructure.An attacker (e.g., insider) with physical access to the computing platform can perform various physical attacks, including probing memory buses and cold-boot style attacks.Previous work on secure (co-)processors provides hardware support for memory encryption and prevents direct leakage of sensitive data over the memory bus.However, an adversary snooping on the bus can still infer sensitive information from the memory access traces.Existing work on Oblivious RAM (ORAM) provides a solution for users to put all data in an ORAM; and accesses to an ORAM are obfuscated such that no information leaks through memory access traces.This method, however, incurs significant memory access overhead.This work is the first to leverage programming language techniques to offer efficient memory-trace oblivious program execution, while providing formal security guarantees.We formally define the notion of memory-trace obliviousness, and provide a type system for verifying that a program satisfies this property.We also describe a compiler that transforms a program into a structurally similar one that satisfies memory trace obliviousness.To achieve optimal efficiency, our compiler partitions variables into several small ORAM banks rather than one large one, without risking security.We use several example programs to demonstrate the efficiency gains our compiler achieves in comparison with the naive method of placing all variables in the same ORAM.

Cited By

View all
  • (2024)Camouflage: Utility-Aware Obfuscation for Accurate Simulation of Sensitive Program TracesACM Transactions on Architecture and Code Optimization10.1145/365011021:2(1-23)Online publication date: 21-May-2024
  • (2024)Taypsi: Static Enforcement of Privacy Policies for Policy-Agnostic Oblivious ComputationProceedings of the ACM on Programming Languages10.1145/36498618:OOPSLA1(1407-1436)Online publication date: 29-Apr-2024
  • (2023)ENIGMAPProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620463(4033-4050)Online publication date: 9-Aug-2023
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CSF '13: Proceedings of the 2013 IEEE 26th Computer Security Foundations Symposium
June 2013
287 pages
ISBN:9780769550312

Publisher

IEEE Computer Society

United States

Publication History

Published: 26 June 2013

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Camouflage: Utility-Aware Obfuscation for Accurate Simulation of Sensitive Program TracesACM Transactions on Architecture and Code Optimization10.1145/365011021:2(1-23)Online publication date: 21-May-2024
  • (2024)Taypsi: Static Enforcement of Privacy Policies for Policy-Agnostic Oblivious ComputationProceedings of the ACM on Programming Languages10.1145/36498618:OOPSLA1(1407-1436)Online publication date: 29-Apr-2024
  • (2023)ENIGMAPProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620463(4033-4050)Online publication date: 9-Aug-2023
  • (2023)Type-directed Program Transformation for Constant-Time EnforcementProceedings of the 25th International Symposium on Principles and Practice of Declarative Programming10.1145/3610612.3610618(1-13)Online publication date: 22-Oct-2023
  • (2023)Taype: A Policy-Agnostic Language for Oblivious ComputationProceedings of the ACM on Programming Languages10.1145/35912617:PLDI(1001-1025)Online publication date: 6-Jun-2023
  • (2021)Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow LinearizationProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484583(715-733)Online publication date: 12-Nov-2021
  • (2020)Efficient oblivious database joinsProceedings of the VLDB Endowment10.14778/3407790.340781413:12(2132-2145)Online publication date: 14-Sep-2020
  • (2020)DeepSnifferProceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems10.1145/3373376.3378460(385-399)Online publication date: 9-Mar-2020
  • (2019)Formal verification of a constant-time preserving C compilerProceedings of the ACM on Programming Languages10.1145/33710754:POPL(1-30)Online publication date: 20-Dec-2019
  • (2019)DR.SGXProceedings of the 35th Annual Computer Security Applications Conference10.1145/3359789.3359809(788-800)Online publication date: 9-Dec-2019
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media