GhostRider

Author:

Liu Chang1,Harris Austin2,Maas Martin3,Hicks Michael1,Tiwari Mohit2,Shi Elaine1

Affiliation:

1. University of Maryland, College Park, College Park, MD, USA

2. University of Texas at Austin, Austin, TX, USA

3. University of California, Berkeley, Berkeley, CA, USA

Abstract

This paper presents a new, co-designed compiler and architecture called GhostRider for supporting privacy preserving computation in the cloud. GhostRider ensures all programs satisfy a property called memory-trace obliviousness (MTO): Even an adversary that observes memory, bus traffic, and access times while the program executes can learn nothing about the program's sensitive inputs and outputs. One way to achieve MTO is to employ Oblivious RAM (ORAM), allocating all code and data in a single ORAM bank, and to also disable caches or fix the rate of memory traffic. This baseline approach can be inefficient, and so GhostRider's compiler uses a program analysis to do better, allocating data to non-oblivious, encrypted RAM (ERAM) and employing a scratchpad when doing so will not compromise MTO. The compiler can also allocate to multiple ORAM banks, which sometimes significantly reduces access times.We have formalized our approach and proved it enjoys MTO. Our FPGA-based hardware prototype and simulation results show that GhostRider significantly outperforms the baseline strategy.

Funder

National Science Foundation

Publisher

Association for Computing Machinery (ACM)

Subject

Computer Graphics and Computer-Aided Design,Software

Reference52 articles.

1. Trusted Platform Module (TPM) Summary. http://www.trustedcomputinggroup.org/resources/trusted_platform_module_tpm_summary. Trusted Platform Module (TPM) Summary. http://www.trustedcomputinggroup.org/resources/trusted_platform_module_tpm_summary.

2. Transforming out timing leaks

3. Non-interference for a JVM-like language

4. Security of multithreaded programs by compilation

5. Preventing Timing Leaks Through Transactional Branching Instructions

Cited by 17 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Camo-DNN: Layer Camouflaging to Protect DNNs against Timing Side-Channel Attacks;2024 IEEE 30th International Symposium on On-Line Testing and Robust System Design (IOLTS);2024-07-03

2. PP-CSA: Practical Privacy-Preserving Software Call Stack Analysis;Proceedings of the ACM on Programming Languages;2024-04-29

3. Formal Hardware/Software Models for Cache Locking Enabling Fast and Secure Code;Lecture Notes in Computer Science;2024

4. TEE-Graph: efficient privacy and ownership protection for cloud-based graph spectral analysis;Frontiers in Big Data;2023-11-30

5. Preventing Coherence State Side Channel Leaks Using TimeCache;IEEE Transactions on Computers;2023-02-01

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3