Active attack against oblivious RAM

Yuto Nakano, Seira Hidano, Shinsaku Kiyomoto, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

When a user consumes an encrypted digital content (for example video and music files), the player application accesses the secret key to decrypt the content. If the user is malicious, he can analyse the access pattern of the player application to extract the secret key efficiently. Oblivious RAMs (ORAMs) are effective solution for such threats. However, ORAMs are only effective for 'passive' attackers who can observe the RAM access done by the application, but cannot alter data stored on RAM. The attacker with ability to alter data on RAM can be called 'active' attackers. In this paper, we evaluate the security of ORAM schemes against active adversaries where they alter data on RAM and try to efficiently extract the secret information. We also propose countermeasures against active adversaries.

Original languageEnglish
Title of host publicationProceedings - 32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018
EditorsLeonard Barolli, Tomoya Enokido, Marek R. Ogiela, Lidia Ogiela, Nadeem Javaid, Makoto Takizawa
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages744-751
Number of pages8
ISBN (Print)9781538621943
DOIs
Publication statusPublished - Aug 9 2018
Event32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018 - Krakow, Poland
Duration: May 16 2018May 18 2018

Publication series

NameProceedings - International Conference on Advanced Information Networking and Applications, AINA
Volume2018-May
ISSN (Print)1550-445X

Other

Other32nd IEEE International Conference on Advanced Information Networking and Applications, AINA 2018
Country/TerritoryPoland
CityKrakow
Period5/16/185/18/18

All Science Journal Classification (ASJC) codes

  • Engineering(all)

Fingerprint

Dive into the research topics of 'Active attack against oblivious RAM'. Together they form a unique fingerprint.

Cite this