TWC: Medium: Collaborative: DIORE: Digital Insertion and Observation Resistant Execution

TWC:媒介:协作:DIORE:数字插入和抗观察执行

基本信息

  • 批准号:
    1314709
  • 负责人:
  • 金额:
    $ 40万
  • 依托单位:
  • 依托单位国家:
    美国
  • 项目类别:
    Standard Grant
  • 财政年份:
    2013
  • 资助国家:
    美国
  • 起止时间:
    2013-08-01 至 2017-07-31
  • 项目状态:
    已结题

项目摘要

Cloud computing allows users to delegate data and computation to cloud providers, at the cost of giving up physical control of their computing infrastructure. An attacker with physical access to the computing platform can perform various physical attacks, referred to as digital insertion and observation attacks, which include probing memory buses, tampering with memory, and cold-boot style attacks. While memory encryption can prevent direct leakage of data under digital observation, memory access patterns to even encrypted data may leak sensitive information. This work will allow organizations to securely outsource their computing infrastructure to an untrusted cloud provider, while preserving a similar level of security as if hosting the infrastructure in houseThis project will develop DIORE (Digital Insertion and Observation Resistant Execution) which is a combined hardware software platform immune to digital insertion and observation attacks. DIORE provides memory-trace oblivious execution, relying on efficient hardware implementations of Oblivious RAM, and novel compiler techniques for partitioning programs such that Oblivious RAM accesses are minimized. This ensures that an adversary with access to a program execution's memory trace learns nothing about the code or data other than what is revealed intentionally. DIORE opens up possibilities for new cloud applications involving sensitive information such as genomic, medical, or financial data -- domains that are considered too privacy sensitive for today's cloud.
云计算允许用户将数据和计算委托给云提供商,代价是放弃对计算基础设施的物理控制。具有对计算平台的物理访问的攻击者可以执行各种物理攻击,称为数字插入和观察攻击,其包括探测存储器总线、篡改存储器和冷启动式攻击。 虽然存储器加密可以防止在数字观测下的数据的直接泄漏,但是对甚至加密的数据的存储器访问模式可能泄漏敏感信息。这项工作将使组织能够安全地将其计算基础设施外包给不受信任的云提供商,同时保持与在内部托管基础设施类似的安全级别。该项目将开发DIORE(数字插入和观察抵抗执行),这是一个组合的硬件软件平台,不受数字插入和观察攻击的影响。DIORE提供内存跟踪不经意执行,依赖于不经意RAM的高效硬件实现,以及用于分区程序的新颖编译器技术,使得不经意RAM访问最小化。这确保了可以访问程序执行的内存跟踪的攻击者除了故意透露的内容之外,对代码或数据一无所知。DIORE为涉及基因组、医疗或金融数据等敏感信息的新云应用程序开辟了可能性--这些领域被认为对当今的云计算过于隐私敏感。

项目成果

期刊论文数量(0)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)

数据更新时间:{{ journalArticles.updateTime }}

{{ item.title }}
{{ item.translation_title }}
  • DOI:
    {{ item.doi }}
  • 发表时间:
    {{ item.publish_year }}
  • 期刊:
  • 影响因子:
    {{ item.factor }}
  • 作者:
    {{ item.authors }}
  • 通讯作者:
    {{ item.author }}

数据更新时间:{{ journalArticles.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ monograph.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ sciAawards.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ conferencePapers.updateTime }}

{{ item.title }}
  • 作者:
    {{ item.author }}

数据更新时间:{{ patent.updateTime }}

Mohit Tiwari其他文献

Avoiding information leakage in the memory controller with fixed service policies
通过固定的服务策略避免内存控制器中的信息泄漏
Design and optimisation of slotted stator tooth switched reluctance motor for torque enhancement for electric vehicle applications
用于电动汽车应用扭矩增强的开槽定子齿开关磁阻电机的设计和优化
  • DOI:
    10.1080/01430750.2021.1873857
  • 发表时间:
    2021
  • 期刊:
  • 影响因子:
    0
  • 作者:
    M. A. Patel;Kamran Asad;Zeel Patel;Mohit Tiwari;Purv Prajapati;H. Panchal;M. Suresh;Ralli Sangno;M. Israr
  • 通讯作者:
    M. Israr
Au nanoparticles decorated ZnO/ZnFe<sub>2</sub>O<sub>4</sub> composite SERS-active substrate for melamine detection
  • DOI:
    10.1016/j.talanta.2021.122819
  • 发表时间:
    2022-01-01
  • 期刊:
  • 影响因子:
  • 作者:
    Mohit Tiwari;Aditya Singh;Samit Dureja;Suddhasatwa Basu;Sudip K. Pattanayek
  • 通讯作者:
    Sudip K. Pattanayek
Sidecars on the Central Lane: Impact of Network Proxies on Microservices
中央车道上的边车:网络代理对微服务的影响
  • DOI:
  • 发表时间:
    2023
  • 期刊:
  • 影响因子:
    0
  • 作者:
    Prateek Sahu;Lu Zheng;Marco Bueso;Shijia Wei;N. Yadwadkar;Mohit Tiwari
  • 通讯作者:
    Mohit Tiwari
Position paper: Sapper -- a language for provable hardware policy enforcement
立场文件:Sapper——一种用于可证明硬件策略执行的语言

Mohit Tiwari的其他文献

{{ item.title }}
{{ item.translation_title }}
  • DOI:
    {{ item.doi }}
  • 发表时间:
    {{ item.publish_year }}
  • 期刊:
  • 影响因子:
    {{ item.factor }}
  • 作者:
    {{ item.authors }}
  • 通讯作者:
    {{ item.author }}

{{ truncateString('Mohit Tiwari', 18)}}的其他基金

SaTC: CORE: Small: Collaborative: Oblivious ISAs for Secure and Efficient Enclave Programming
SaTC:核心:小型:协作:用于安全高效 Enclave 编程的不经意的 ISA
  • 批准号:
    1817020
  • 财政年份:
    2018
  • 资助金额:
    $ 40万
  • 项目类别:
    Standard Grant
SaTC: CORE: Medium: Guarding Noisy Neighborhoods with Weak Detectors
SaTC:核心:中:用弱探测器保护嘈杂的社区
  • 批准号:
    1704778
  • 财政年份:
    2017
  • 资助金额:
    $ 40万
  • 项目类别:
    Standard Grant
STTR Phase I: Building a Trustworthy Cyberspace through Data Security as a Service
STTR第一阶段:通过数据安全即服务构建可信赖的网络空间
  • 批准号:
    1549833
  • 财政年份:
    2016
  • 资助金额:
    $ 40万
  • 项目类别:
    Standard Grant
I-Corps: Trustworthy Cyberspace Through Data-Security as a Service.
I-Corps:通过数据安全即服务实现值得信赖的网络空间。
  • 批准号:
    1558967
  • 财政年份:
    2015
  • 资助金额:
    $ 40万
  • 项目类别:
    Standard Grant
CAREER: Exo-Core: An Architecture to Detect Malware as Computational Anomalies
职业:Exo-Core:一种将恶意软件检测为计算异常的架构
  • 批准号:
    1453806
  • 财政年份:
    2015
  • 资助金额:
    $ 40万
  • 项目类别:
    Continuing Grant

相似海外基金

TWC SBE: Medium: Collaborative: Brain Hacking: Assessing Psychological and Computational Vulnerabilities in Brain-based Biometrics
TWC SBE:媒介:协作:大脑黑客:评估基于大脑的生物识别技术中的心理和计算漏洞
  • 批准号:
    1840790
  • 财政年份:
    2018
  • 资助金额:
    $ 40万
  • 项目类别:
    Continuing Grant
TWC: Medium: Collaborative: Black-Box Evaluation of Cryptographic Entropy at Scale
TWC:媒介:协作:大规模密码熵的黑盒评估
  • 批准号:
    1937622
  • 财政年份:
    2018
  • 资助金额:
    $ 40万
  • 项目类别:
    Standard Grant
TWC SBE: Medium: Collaborative: Building a Privacy-Preserving Social Networking Platform from a Technological and Sociological Perspective
TWC SBE:媒介:协作:从技术和社会学角度构建保护隐私的社交网络平台
  • 批准号:
    1855391
  • 财政年份:
    2018
  • 资助金额:
    $ 40万
  • 项目类别:
    Standard Grant
TWC: Medium: Collaborative: Systems, Tools, and Techniques for Executing, Managing, and Securing SGX Programs
TWC:媒介:协作:用于执行、管理和保护 SGX 程序的系统、工具和技术
  • 批准号:
    1834213
  • 财政年份:
    2018
  • 资助金额:
    $ 40万
  • 项目类别:
    Standard Grant
TWC: Medium: Collaborative: Efficient Repair of Learning Systems via Machine Unlearning
TWC:媒介:协作:通过机器取消学习有效修复学习系统
  • 批准号:
    1854000
  • 财政年份:
    2018
  • 资助金额:
    $ 40万
  • 项目类别:
    Standard Grant
TWC: Medium: Collaborative: Seal: Secure Engine for AnaLytics - From Secure Similarity Search to Secure Data Analytics
TWC:媒介:协作:Seal:AnaLytics 的安全引擎 - 从安全相似性搜索到安全数据分析
  • 批准号:
    1929901
  • 财政年份:
    2018
  • 资助金额:
    $ 40万
  • 项目类别:
    Standard Grant
TWC: TTP Option: Medium: Collaborative: MALDIVES: Developing a Comprehensive Understanding of Malware Delivery Mechanisms
TWC:TTP 选项:中:协作:马尔代夫:全面了解恶意软件传播机制
  • 批准号:
    1748127
  • 财政年份:
    2017
  • 资助金额:
    $ 40万
  • 项目类别:
    Standard Grant
TWC SBE: Medium: Collaborative: Dollars for Hertz: Making Trustworthy Spectrum Sharing Technically and Economically Viable
TWC SBE:媒介:协作:赫兹美元:使值得信赖的频谱共享在技术上和经济上可行
  • 批准号:
    1801986
  • 财政年份:
    2017
  • 资助金额:
    $ 40万
  • 项目类别:
    Standard Grant
TWC: Medium: Collaborative: New Protocols and Systems for RAM-Based Secure Computation
TWC:媒介:协作:基于 RAM 的安全计算的新协议和系统
  • 批准号:
    1562888
  • 财政年份:
    2016
  • 资助金额:
    $ 40万
  • 项目类别:
    Standard Grant
TWC: Medium: Collaborative: Systems, Tools, and Techniques for Executing, Managing, and Securing SGX Programs
TWC:媒介:协作:用于执行、管理和保护 SGX 程序的系统、工具和技术
  • 批准号:
    1563848
  • 财政年份:
    2016
  • 资助金额:
    $ 40万
  • 项目类别:
    Standard Grant
{{ showInfoDetail.title }}

作者:{{ showInfoDetail.author }}

知道了