University of Minnesota
Security and Privacy in Computing
index.php

Readings on: ORAM algorithms and applications (hiding access patterns)

Optional background reading: Oded Goldreich and Rafail Ostrovsky. “Software protection and simulation on oblivious RAMs”. J. ACM, 43(3):431–473, May 1996.
[ACM DL]

Optional background video: This 2015 Winter School lecture by Benny Pinkas (YouTube) introduces ORAMs. The first 23 minutes or so talk about the problem and the square-root ORAM construction, which is a good background for the Path ORAM paper.

Main reading for January 23rd: Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas. “Path ORAM: an extremely simple oblivious RAM protocol”. In ACM Conference on Computer and Communications Security (CCS), pages 299–310, Berlin, Germany, November 2013.
[ACM DL]
You don't have to understand all the combinatorics details in sections 6.3 and 6.4.

Candidate reading on applications (not selected): Ashay Rane, Calvin Lin, and Mohit Tiwari, “Raccoon: Closing Digital Side-Channels through Obfuscated Execution”. In USENIX Security Symposium, August 2015.
[USENIX]

Candidate reading on applications (not selected): Pietro Borrello, Daniele Cono D'Elia, Leonardo Querzoni, and Cristiano Giuffrida. “Constantine: Automatic Side-Channel Resistance Using Efficient Control and Data Flow Linearization”. In ACM Conference on Computer and Communications Security (CCS), pages 715–733, November 2021.
[ACL DL]

Main reading for January 25th: Weikeng Chen and Raluca Ada Popa. “Metal: A Metadata-Hiding File-Sharing System”. In Network and Distributed Systems Security Symposium (NDSS), February 2020.
[NDSS] [Conference talk (YouTube)]

Candidate reading on applications (not selected): Weikeng Chen, Thang Hoang, Jorge Guajardo, and Attila A. Yavuz. “Titanium: A Metadata-Hiding File-Sharing System with Malicious Security”. In Network and Distributed Systems Security Symposium (NDSS), April 2022.
[NDSS]