Main navigation | Main content
Optional background reading:
Oded Goldreich and Rafail Ostrovsky. “Software protection and
simulation on oblivious RAMs”. J. ACM,
43(3):431–473, May 1996.
[ACM DL]
Optional background video: This 2015 Winter School lecture by Benny Pinkas (YouTube) introduces ORAMs. The first 23 minutes or so talk about the problem and the square-root ORAM construction, which is a good background for the Path ORAM paper.
Main reading for January 23rd:
Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher Fletcher, Ling
Ren, Xiangyao Yu, and Srinivas Devadas.
“Path ORAM: an extremely simple oblivious RAM protocol”.
In ACM Conference on Computer and Communications Security (CCS),
pages 299–310, Berlin, Germany, November 2013.
[ACM DL]
You don't have to understand all the combinatorics details in sections
6.3 and 6.4.
Candidate reading on applications (not selected):
Ashay Rane, Calvin Lin, and Mohit Tiwari,
“Raccoon: Closing Digital Side-Channels through Obfuscated
Execution”.
In USENIX Security Symposium, August 2015.
[USENIX]
Candidate reading on applications (not selected):
Pietro Borrello, Daniele Cono D'Elia, Leonardo Querzoni, and Cristiano
Giuffrida.
“Constantine: Automatic Side-Channel Resistance Using Efficient
Control and Data Flow Linearization”.
In ACM Conference on Computer and Communications Security (CCS),
pages 715–733, November 2021.
[ACL DL]
Main reading for January 25th:
Weikeng Chen and Raluca Ada Popa.
“Metal: A Metadata-Hiding File-Sharing System”.
In Network and Distributed Systems Security Symposium (NDSS),
February 2020.
[NDSS]
[Conference talk (YouTube)]
Candidate reading on applications (not selected):
Weikeng Chen, Thang Hoang, Jorge Guajardo, and Attila A. Yavuz.
“Titanium: A Metadata-Hiding File-Sharing System
with Malicious Security”.
In Network and Distributed Systems Security Symposium (NDSS),
April 2022.
[NDSS]