Le et al., 2020 - Google Patents
A tale of two trees: one writes, and other readsLe et al., 2020
View PDF- Document ID
- 2246385775743281012
- Author
- Le D
- Hurtado L
- Ahmad A
- Minaei M
- Lee B
- Kate A
- Publication year
- Publication venue
- Proceedings on Privacy Enhancing Technologies
External Links
Snippet
The Bitcoin network has offered a new way of securely performing financial transactions over the insecure network. Nevertheless, this ability comes with the cost of storing a large (distributed) ledger, which has become unsuitable for personal devices of any kind …
- 238000013461 design 0 abstract description 38
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/575—Secure boot
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
- G06F21/46—Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hoang et al. | Hardware-supported ORAM in effect: Practical oblivious search and update on very large dataset | |
Gueron | Memory encryption for general-purpose processors | |
CN109643359B (en) | Verification of control key-value store | |
Dai et al. | SBLWT: A secure blockchain lightweight wallet based on trustzone | |
Checkoway et al. | Iago attacks: Why the system call API is a bad untrusted RPC interface | |
KR100996784B1 (en) | Saving and retrieving data based on public key encryption | |
ES2881486T3 (en) | System and method of obfuscating an identifier to protect the identifier from unauthorized appropriation | |
Le et al. | A tale of two trees: one writes, and other reads | |
CN107506659B (en) | Data protection system and method of general database based on SGX | |
US11392724B2 (en) | Method for accelerating execution of application in a trusted execution environment | |
Hoang et al. | MOSE: Practical multi-user oblivious storage via secure enclaves | |
Choi et al. | A hybrid approach to secure function evaluation using SGX | |
Tople et al. | {PRO-ORAM}: Practical {Read-Only} Oblivious {RAM} | |
Dai et al. | Trustzone-based secure lightweight wallet for hyperledger fabric | |
Drucker et al. | Combining homomorphic encryption with trusted execution environment: a demonstration with paillier encryption and SGX | |
Rabimba et al. | Lessons learned from blockchain applications of trusted execution environments and implications for future research | |
Fuhry et al. | Hardidx: Practical and secure index with SGX in a malicious environment | |
Jakkamsetti et al. | Scalable private signaling | |
Zhao et al. | A private user data protection mechanism in trustzone architecture based on identity authentication | |
Coppolino et al. | Exploiting new CPU extensions for secure exchange of eHealth data at the EU level | |
McGregor et al. | Protecting cryptographic keys and computations via virtual secure coprocessing | |
Bhudia et al. | RansomClave: ransomware key management using SGX | |
Le et al. | A tale of two trees: One writes, and other reads. optimized oblivious accesses to large-scale blockchains | |
Bakas et al. | Nowhere to leak: Forward and backward private symmetric searchable encryption in the multi-client setting (extended version) | |
Shin | Multibyte microarchitectural data sampling and its application to session key extraction attacks |