• Publications
  • Influence
Panoply: Low-TCB Linux Applications With SGX Enclaves
TLDR
We present a new system called PANOPLY which bridges the gap between the SGX-native abstractions and the standard OS abstractions which feature-rich, commodity Linux applications require. Expand
  • 159
  • 26
  • PDF
Auror: defending against poisoning attacks in collaborative deep learning systems
TLDR
We investigate the setting of indirect collaborative deep learning wherein users submit masked features rather than direct data. Expand
  • 78
  • 12
  • PDF
A Traceability Analysis of Monero's Blockchain
TLDR
We quantify the efficacy of three attacks on Monero’s untraceability guarantee, which promises to make it hard to trace the origin of a received fund, by analyzing its blockchain data. Expand
  • 87
  • 5
  • PDF
Privado: Practical and Secure DNN Inference
TLDR
This paper addresses the three main challenges that SGX-based DNN inferencing faces, namely, security, ease-of-use, and performance. Expand
  • 29
  • 2
  • PDF
Falcon: Honest-Majority Maliciously Secure Framework for Private Deep Learning
TLDR
We present Falcon — an efficient and expressive 3-party deep learning framework that provides support for both training and inference with malicious security guarantees. Expand
  • 16
  • 2
  • PDF
Faster Secure Arithmetic Computation Using Switchable Homomorphic Encryption
TLDR
We investigate a new secure arithmetic computation primitive called switchable homomorphic encryption (or SHE) that securely switches between existing inexpensive partially homomorphic encryption techniques to evaluate arbitrary arithmetic circuits over integers. Expand
  • 11
  • 2
  • PDF
On the Trade-Offs in Oblivious Execution Techniques
TLDR
We demonstrate a concrete practical attack—called a logic-reuse attack—that leaks every byte of encrypted input if oblivious techniques are not used. Expand
  • 13
  • 2
  • PDF
AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content
TLDR
We investigate the feasibility of a web server architecture, wherein the vulnerable server VM runs on a trusted cloud. Expand
  • 24
  • 1
  • PDF
A Traceability Analysis of Monero ’ s Blockchain April 17 , 2017
Monero is a cryptocurrency that has rapidly gained popularity since its launch in April 2014. The source of its growth can be mainly attributed to its unique privacy properties that go well beyondExpand
  • 5
  • 1
  • PDF
PermuteRam: Optimizing Oblivious Computation for Efficiency
Privacy preserving computation is gaining importance. Along with secure computation guarantees, it is essential to hide information leakage through access patterns. Input-oblivious execution is aExpand
  • 4
  • 1
  • PDF