Show simple item record

dc.contributor.authorDijk, Marten van
dc.contributor.authorDevadas, Srinivas
dc.contributor.authorFletcher, Christopher Wardlaw
dc.date.accessioned2015-11-23T14:52:17Z
dc.date.available2015-11-23T14:52:17Z
dc.date.issued2012-10
dc.identifier.isbn9781450316620
dc.identifier.urihttp://hdl.handle.net/1721.1/99986
dc.description.abstractThis paper considers encrypted computation where the user specifies encrypted inputs to an untrusted program, and the server computes on those encrypted inputs. To this end we propose a secure processor architecture, called Ascend, that guarantees privacy of data when arbitrary programs use the data running in a cloud-like environment (e.g., an untrusted server running an untrusted software stack). The key idea to guarantee privacy is obfuscated instruction execution; Ascend does not disclose what instruction is being run at any given time, be it an arithmetic instruction or a memory instruction. Periodic accesses to external instruction and data memory are performed through an Oblivious RAM (ORAM) interface to prevent leakage through memory access patterns. We evaluate the processor architecture on SPEC benchmarks running on encrypted data and quantify overheads.en_US
dc.language.isoen_US
dc.publisherAssociation for Computing Machinery (ACM)en_US
dc.relation.isversionofhttp://dx.doi.org/10.1145/2382536.2382540en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceMIT web domainen_US
dc.titleA secure processor architecture for encrypted computation on untrusted programsen_US
dc.typeArticleen_US
dc.identifier.citationChristopher W. Fletcher, Marten van Dijk, and Srinivas Devadas. 2012. A secure processor architecture for encrypted computation on untrusted programs. In Proceedings of the seventh ACM workshop on Scalable trusted computing (STC '12). ACM, New York, NY, USA, 3-8.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratoryen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Scienceen_US
dc.contributor.mitauthorFletcher, Christopher Wardlawen_US
dc.contributor.mitauthorDevadas, Srinivasen_US
dc.relation.journalProceedings of the seventh ACM workshop on Scalable trusted computing (STC '12)en_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/ConferencePaperen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dspace.orderedauthorsFletcher, Christopher W.; Dijk, Marten van; Devadas, Srinivasen_US
dc.identifier.orcidhttps://orcid.org/0000-0001-8253-7714
dc.identifier.orcidhttps://orcid.org/0000-0003-1467-2150
mit.licenseOPEN_ACCESS_POLICYen_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record