首页> 外文学位 >Trace oblivious program execution.
【24h】

Trace oblivious program execution.

机译:跟踪遗忘的程序执行。

获取原文
获取原文并翻译 | 示例

摘要

The big data era has dramatically transformed our lives; however, security incidents such as data breaches can put sensitive data (e.g. photos, identities, genomes) at risk. To protect users' data privacy, there is a growing interest in building secure cloud computing systems, which keep sensitive data inputs hidden, even from computation providers. Conceptually, secure cloud computing systems leverage cryptographic techniques (e.g., secure multiparty computation) and trusted hardware (e.g. secure processors) to instantiate a "secure" abstract machine consisting of a CPU and encrypted memory, so that an adversary cannot learn information through either the computation within the CPU or the data in the memory. Unfortunately, evidence has shown that side channels (e.g. memory accesses, timing, and termination) in such a "secure" abstract machine may potentially leak highly sensitive information, including cryptographic keys that form the root of trust for the secure systems.;This thesis broadly expands the investigation of a research direction called trace oblivious computation, where programming language techniques are employed to prevent side channel information leakage. We demonstrate the feasibility of trace oblivious computation, by formalizing and building several systems, including GhostRider, which is a hardware-software co-design to provide a hardware-based trace oblivious computing solution, SCVM, which is an automatic RAM-model secure computation system, and ObliVM, which is a programming framework to facilitate programmers to develop applications. All of these systems enjoy formal security guarantees while demonstrating a better performance than prior systems, by one to several orders of magnitude.
机译:大数据时代已经极大地改变了我们的生活;但是,诸如数据泄露之类的安全事件可能会使敏感数据(例如照片,身份,基因组)面临风险。为了保护用户的数据隐私,人们越来越关注构建安全的云计算系统,该系统可以隐藏敏感数据输入,即使是来自计算提供商的数据也是如此。从概念上讲,安全的云计算系统利用密码技术(例如,安全的多方计算)和受信任的硬件(例如,安全的处理器)来实例化由CPU和加密的内存组成的“安全”抽象机,从而使对手无法通过任何一种方式来学习信息。 CPU内的计算或内存中的数据。不幸的是,证据表明,在这种“安全的”抽象机器中的辅助通道(例如,内存访问,定时和终止)可能潜在地泄露高度敏感的信息,包括构成安全系统信任根的加密密钥。广泛地扩展了对称为跟踪遗忘计算的研究方向的研究,其中采用了编程语言技术来防止边信道信息泄漏。通过形式化和构建几个系统,包括GhostRider(它是一种硬件软件协同设计,以提供基于硬件的跟踪遗忘计算解决方案,SCVM,这是一种自动RAM模型安全计算),我们证明了跟踪遗忘计算的可行性。系统和ObliVM,这是一个编程框架,可帮助程序员开发应用程序。所有这些系统都享有正式的安全保证,同时表现出比以前的系统好一个到几个数量级的性能。

著录项

  • 作者

    Liu, Chang.;

  • 作者单位

    University of Maryland, College Park.;

  • 授予单位 University of Maryland, College Park.;
  • 学科 Computer science.
  • 学位 Ph.D.
  • 年度 2016
  • 页码 281 p.
  • 总页数 281
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号