Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–4 of 4 results for author: ElAtali, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.15302  [pdf, other

    cs.CR

    BliMe Linter

    Authors: Hossam ElAtali, Xiaohe Duan, Hans Liljestrand, Meng Xu, N. Asokan

    Abstract: Outsourced computation presents a risk to the confidentiality of clients' sensitive data since they have to trust that the service providers will not mishandle this data. Blinded Memory (BliMe) is a set of hardware extensions that addresses this problem by using hardware-based taint tracking to keep track of sensitive client data and enforce a security policy that prevents software from leaking th… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

  2. arXiv:2406.12110  [pdf, other

    cs.CR cs.AR

    Cancellable Memory Requests: A transparent, lightweight Spectre mitigation

    Authors: Hossam ElAtali, N. Asokan

    Abstract: Speculation is fundamental to achieving high CPU performance, yet it enables vulnerabilities such as Spectre attacks, which remain a significant challenge to mitigate without incurring substantial performance overheads. These attacks typically unfold in three steps: they speculatively access sensitive data (access), alter the cache state (transmit), and then utilize a cache timing attack (e.g., Fl… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

  3. Data-Oblivious ML Accelerators using Hardware Security Extensions

    Authors: Hossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan

    Abstract: Outsourced computation can put client data confidentiality at risk. Existing solutions are either inefficient or insufficiently secure: cryptographic techniques like fully-homomorphic encryption incur significant overheads, even with hardware assistance, while the complexity of hardware-assisted trusted execution environments has been exploited to leak secret data. Recent proposals such as BliMe… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

    Journal ref: IEEE International Symposium on Hardware Oriented Security and Trust (HOST), 2024, pp. 373-377

  4. BliMe: Verifiably Secure Outsourced Computation with Hardware-Enforced Taint Tracking

    Authors: Hossam ElAtali, Lachlan J. Gunn, Hans Liljestrand, N. Asokan

    Abstract: Outsourced computing is widely used today. However, current approaches for protecting client data in outsourced computing fall short: use of cryptographic techniques like fully-homomorphic encryption incurs substantial costs, whereas use of hardware-assisted trusted execution environments has been shown to be vulnerable to run-time and side-channel attacks. We present Blinded Memory (BliMe), an… ▽ More

    Submitted 29 November, 2023; v1 submitted 20 April, 2022; originally announced April 2022.

    Comments: Accepted for publication at the Network and Distributed System Security (NDSS) Symposium 2024