![]() In IEEE Symposium on Security and Privacy, 2013. An Ideal-Security Protocol for Order-Preserving Encoding. CLAMP: Practical Prevention of Large-Scale Data Leaks. Public-key Cryptosystems Based on Composite Degree Residuosity Classes. SCiFI - A System for Secure Face Identification. In IEEE Computer Security Foundations Symposium(CSF), 2012. Information-flow Control for Programming on Encrypted data. Flicker: An Execution Infrastructure for TCB Minimization. TrustVisor: Efficient TCB Reduction and Attestation. Fairplay - A Secure Two-Party Computation System. In IEEE Transactions on Image Processing, 2005. Fingerprinting Protocol for Images Based on Additive Homomorphic Property. In IEEE Computer Security Foundations Symposium, 2009. A Provably Secure And Efficient Countermeasure Against Timing Attacks. Making Linux Protection Mechanisms Egalitarian with UserFS. Faster Secure Two-Party Computation Using Garbled Circuits. TASTY: Tool for Automating Secure Two-partY computations. Flow-sensitive Pointer Analysis for Millions of Lines of Code. Implementing gentry0s fully-homomorphic encryption scheme. A Working Implementation of Fully Homomorphic Encryption. In 41st Annual ACM Symposium on Theory of Computing, 2009. Fully Homomorphic Encryption Using Ideal Lattices. Non-interactive verifiable computing: Outsourcing computation to untrusted workers. Information-flow Types for Homomorphic Encryptions. In Cryptology ePrint Archive, Report 2012/266. Compilation Techniques for Efficient Encrypted Computation. A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms. A Lattice Model of Secure Information Flow. Asynchronous Multiparty Computation: Theory and Implementation. In Electronic Colloquium on Computational Complexity, 2011. Fully Homomorphic Encryption without Bootstrapping. Targeted Malleability: Homomorphic Encryption for Restricted Computations. Public Key Encryption with Keyword Search. Encrypted Domain DCT Based on Homomorphic Cryptosystems. FairplayMP: A System for Secure Multi-party Computation. Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves. Standards for the protection of personal information of residents of the commonwealth.Mcafee host intrusion prevention for server.We show that x86 code transformed with AutoCrypt achieves performance that is significantly better than its alternatives (downloading to a trusted client, or using fully-homomorphic encryption). Key to achieving this expressiveness over encrypted data, is our scheme to combine and convert between partially-homomorphic encryption (PHE) schemes using a small TCB in the trusted cloud hypervisor. We show that such a transformation is feasible for several standard Unix utilities available in a typical LAMP stack, with no developer effort. ![]() As a step towards this goal, we develop a tool called AutoCrypt, which transforms a subset of existing C functionality in the web stack to operate on encrypted sensitive content. In this context, the main challenge is to allow the legitimate functionality of the untrusted server VM to work. All sensitive web content is made available to the vulnerable server VM in encrypted form, thereby limiting the effectiveness of data-stealing attacks through server VM compromise. In this work, we investigate the feasibility of a web server architecture, wherein the vulnerable server VM runs on a trusted cloud. Web servers are vulnerable to a large class of attacks which can allow network attacker to steal sensitive web content. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |