Active attack against oblivious RAM

Yuto Nakano, Seira Hidano, Shinsaku Kiyomoto, Kouichi Sakurai

研究成果: Chapter in Book/Report/Conference proceedingConference contribution

抄録

When a user consumes an encrypted digital content (for example video and music files), the player application accesses the secret key to decrypt the content. If the user is malicious, he can analyse the access pattern of the player application to extract the secret key efficiently. Oblivious RAMs (ORAMs) are effective solution for such threats. However, ORAMs are only effective for 'passive' attackers who can observe the RAM access done by the application, but cannot alter data stored on RAM. The attacker with ability to alter data on RAM can be called 'active' attackers. In this paper, we evaluate the security of ORAM schemes against active adversaries where they alter data on RAM and try to efficiently extract the secret information. We also propose countermeasures against active adversaries.

本文言語英語
ホスト出版物のタイトルProceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018
編集者Leonard Barolli, Tomoya Enokido, Marek R. Ogiela, Lidia Ogiela, Nadeem Javaid, Makoto Takizawa
出版社Institute of Electrical and Electronics Engineers Inc.
ページ744-751
ページ数8
ISBN(印刷版)9781538621943
DOI
出版ステータス出版済み - 8 9 2018
イベント32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018 - Krakow, ポーランド
継続期間: 5 16 20185 18 2018

出版物シリーズ

名前Proceedings - International Conference on Advanced Information Networking and Applications, AINA
2018-May
ISSN(印刷版)1550-445X

その他

その他32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018
Countryポーランド
CityKrakow
Period5/16/185/18/18

All Science Journal Classification (ASJC) codes

  • Engineering(all)

フィンガープリント 「Active attack against oblivious RAM」の研究トピックを掘り下げます。これらがまとまってユニークなフィンガープリントを構成します。

引用スタイル