Giter Club home page Giter Club logo

tc_reading_group's Introduction

Trusted Computing Paper Reading Hour

This file contains a protocol of all the papers we have read and discussed together as a group. We try to keep it at a two week schedule, but due to some unfortunate events we may move the dates a little bit around.

Goal

The goal of this reading hour is to make us get better understanding of what we are reading. We try to review the paper as good as possible and discuss our different viewpoints on the paper in our group. We expect the outcome for us to get better at a) reading, b) understanding, c) reviewing, and d) discussions about a certain topic.

Interests

Our interests are highly tied to our research fields. We are interested in the following topics:

  • Cryptography
  • Privacy Enhancing Technologies
  • Web Technologies
Date Author(s) Paper Link (if available)
6. Nov. 2017 A. Keshav How to Read a Paper
21. Nov. 2017 D. Chaum Group Signatures
12. Dec. 2017 W. Diffie, M. E. Hellman New Directions in Cryptography PDF, Citation
16. Jan. 2018 T. ElGamal A public key cryptosystem and a signature scheme based on discrete logarithms PDF (IEEE), PDF Citation
8. Feb. 2018 EJ. Goh Secure Indexes PDF
13. March 2018 G. Zyskind, et. al. Decentralizing Privacy PDF

How does this class work?

This is an open session in our working group. Everyone is invited but it is not mandatory to come. We understand, that everyone has his daily work to do and that we cannot have everyone participating each time. We keep this sessions as open as possible. We don't follow a fixed schedule on what we want to discuss. This usually leads to very good discussions about the content of the paper. At least this was our experience.

Preparation Phase

Prior to each session, we have the group proposing papers from which they find interesting to read. We then randomly pick one that is going to be read by the group until the next meeting.

The Session

At the beginning of the session, the person who proposed the paper gives a short presentation about the content of the paper. This should give the others a quick overview about the paper (which they have read anyway). We think, that this presentation can already solve some open questions. Furthermore, it is a good exercise to sum up the paper for the presenter.

After the initial presentation we try to ask questions. The questions are not directed to the presenter, but to the group. Of course we expect the presenter to be the person being able to answer the questions, but this is not neccessary. The questions should be focused on the topic of the paper. We think it is best for the preparation to prepare some questions in advance. If anything is unclear for you, you should ask. There are no stupid questions!

Our last point is a discussion on the writing style of the paper. We try to identify strength in the writing, e.g. parts we liked, were easy to understand, etc. and parts which were hard to understand. Whenever we find a part that is hard to understand, it is the task of that person to also suggest, how he thinks this part could be rewritten to make it better understandable.

We hope that you can find some interesting information on this page. If you have any comments, please feel free to contact us here on GitHub.

A

Todos

tc_reading_group's People

Contributors

jmpzero avatar stefan2904 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar

Watchers

 avatar

tc_reading_group's Issues

So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by User

The failure of users to follow security advice has often been noted. They chose weak passwords, ignore security warnings, and are oblivious to certificates. It is often suggested that users are hopelessly lazy and unmotivated on security questions. We argue that users’ rejection of the security advice they receive is entirely rational from an economic perspective. As with many activities, online crime generates direct losses and externalities. The advice offers to shield them from the direct costs of attacks, but burdens them with the indirect costs, or externalities. Since the direct costs are generally small relative to the indirect ones, they reject this bargain. We examine three areas of user education: password rules, phishing site identification, and SSL certificates. In each we find that the advice is complex and growing, but the benefit is largely speculative or moot. In the cases where we can estimate benefit, it emerges that the burden of following the security advice is actually greater than the direct losses caused by the attack.

Spectre Attacks: Exploiting Speculative Execution

Spectre breaks the isolation between different applications. It allows an attacker to trick error-free programs, which follow best practices, into leaking their secrets. In fact, the safety checks of said best practices actually increase the attack surface and may make applications more susceptible to Spectre

Spectre is harder to exploit than Meltdown, but it is also harder to mitigate. However, it is possible to prevent specific known exploits based on Spectre through software patches.

https://spectreattack.com/spectre.pdf

Meltdown

Meltdown breaks the most fundamental isolation between user applications and the operating system. This attack allows a program to access the memory, and thus also the secrets, of other programs and the operating system.

If your computer has a vulnerable processor and runs an unpatched operating system, it is not safe to work with sensitive information without the chance of leaking the information. This applies both to personal computers as well as cloud infrastructure. Luckily, there are software patches against Meltdown.

https://meltdownattack.com/meltdown.pdf

Benchmarking Crimes: An Emerging Threat in Systems Security

—Properly benchmarking a system is a difficult and intricate task. Unfortunately, even a seemingly innocuous bench-marking mistake can compromise the guarantees provided by a given systems security defense and also put its reproducibility and comparability at risk. This threat is particularly insidious as it is generally not a result of malice and can easily go undetected by both authors and reviewers. Moreover, as modern defenses often trade off security for performance in an attempt to find an ideal design point in the performance-security space, the damage caused by benchmarking mistakes is increasingly worrisome. To analyze the magnitude of the phenomenon, we identify a set of 22 " benchmarking crimes " that threaten the validity of systems security evaluations and perform a survey of 50 defense papers published in top venues. To ensure the validity of our results, we perform the complete survey twice, with two independent readers. We find only a very small number of disagreements between readers, showing that our assessment of benchmarking crimes is highly reproducible. We show that benchmarking crimes are widespread even in papers published at tier-1 venues. We find that tier-1 papers commit an average of five benchmarking crimes and we find only a single paper in our sample that committed no benchmarking crimes. Moreover, we find that the scale of the problem is constant over time, suggesting that the community is not yet addressing it despite the problem being now more relevant than ever. This threatens the scientific process, which relies on reproducibility and comparability to ensure that published research advances the state of the art. We hope to raise awareness of these issues and provide recommendations to improve benchmarking quality and safeguard the scientific process in our community.

https://arxiv.org/pdf/1801.02381.pdf

How to play ANY mental game

How to play ANY mental game
or
A Completeness Theorem for Protocols with Honest Majority

https://dl.acm.org/citation.cfm?id=28420

Authors

  • O. Goldreich --> Dept. of Computer Sc. Technion Haifa, Israel
  • S. Micali --> Lab. for Computer Sc. MIT Cambridge, MA
  • A. Wigderson --> Inst. of Math. and CS, Hebrew University, Jerusalem, Israel

Abstract

We present a polynomial-time algorithm that, given as input the description of a game with incomplete information and any number of players, produces a protocol for playing the game that leaks no partial information, provided the majority of the players is honest.

Our algorithm automatically solves all the multi-party protocol problems addressed in complexity-based cryptography during the last 10 years. It actually is a completeness theorem for the class of distributed protocols with honest majority. Such completeness theorem is optimal in the sense that, if the majority of the players is not honest, some protocol problems have no efficient solution.

Published

STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
Pages 218-229

Secure Indexes

Secure Indexes

KW

[0] https://eprint.iacr.org/2003/216.pdf
[1]
A secure index is a data structure that allows a querier with a ``trapdoor''
for a word x to test in O(1) time only if the index contains x; The index
reveals no information about its contents without valid trapdoors, and
trapdoors can only be generated with a secret key. Secure indexes are
a natural extension of the problem of constructing data structures with
privacy guarantees such as those provided by oblivious and history
independent data structures. In this paper, we formally define a secure
index and formulate a security model for indexes known as semantic
security against adaptive chosen keyword attack (IND-CKA). We also
develop an efficient IND-CKA secure index construction called Z-IDX
using pseudo-random functions and Bloom filters, and show how to use
Z-IDX to implement searches on encrypted data. This search scheme is
the most efficient encrypted data search scheme currently known; It
provides O(1) search time per document, and handles compressed data,
variable length words, and boolean and certain regular expression queries.
The techniques developed in this paper can also be used to build encrypted
searchable audit logs, private database query schemes, accumulated
hashing schemes, and secure set membership tests.

Adaptive One-Way Functions and Applications

by Omkant Pandey (UCLA), Rafael Pass (Cornell), and Vinod Vaikuntanathan (MIT)
at Crypto 2008

Keywords

  • Cryptographic Assumptions
  • Non-malleable Commitment
  • Non-malleable Zero-knowledge

Abstract

We introduce new and general complexity theoretic hard-
ness assumptions. These assumptions abstract out concrete properties of
a random oracle and are significantly stronger than traditional crypto-
graphic hardness assumptions; however, assuming their validity we can
resolve a number of long-standing open problems in cryptography.

Headlines

  1. Introduction
    a. Adaptive Hardness Assumptions
    b. Our Results
  2. New Assumptions and Definitions
    a. Adaptive One-Way Functions
    b. Adaptive Pseudorandom Generator
    c. Adaptively Secure Commitment Schemes
  3. Non-malleable Commitment Schemes
  4. Four-round Non-malleable Zero-knowledge
    a. An Adaptively Secure WI Proof of Knowledge
    b. The Non-malleable Zero-Knowledge Argument System
  5. CCA-2 Secure Encryption Scheme

Links

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.