News


C.W. Fletcher, L. Ren, X. Yu, M. van Dijk, O. Khan, and S, Devadas. Exploiting Dynamic Program Behavior with Oblivious RAM while Provably Bounding Tining Channel Leakage. To appear in the Proceedings of the 20th International Symposium on High Performance Computer Architecture (HPCA), 2014.

C.W. Fletcher, L. Ren, X. Yu, M. van Dijk, A. Kwon, O. Khan, and S. Devadas. Ascend: An Architecture for Performing Secure Computation on Encrypted Data. Poster presented at the ACSC Annual Conference, Boston, November 12, 2013. Best Poster presentation Award, Second Place .

October 30 and November 1: Talks at Philips Research and University of Darmstadt

E. Stefanov, M. van Dijk, E. Shi, C.W. Fletcher, L. Ren, X. Yu, and S. Devadas. Path ORAM: An Extremely Simple Oblivious RAM Protocol.  ACM Conference on Computer and Communications Security (CCS) 2013. Best Student Paper Award

X. Yu, C.W. Fletcher, L. Ren, M. van Dijk, and S. Devadas. Generalized External Interaction with Tamper-Resistant Hardware with Bounded Information Leakage. ACM Cloud Computing Security Workshop (CCSW) 2013.

L. Ren, C.W. Fletcher, X. Yu, M. van Dijk and S. Devadas. Integrity Verification for Path Oblivious-RAM. IEEE High Performance Extreme Computing Conference (HPEC) 2013.

M. van Dijk, A. Juels, A. Oprea, and R. L. Rivest. FlipIt: The Game of "Stealthy Takeover".  J. Cryptology 26(4): 655-713 (2013)

Press: Hardware Trick Could Keep Cloud Data Safe - IEEE Spectrum


© Marten van Dijk 2013 (web site created using Sandvox)