Closed pentium3 closed 2 years ago
Trends in Security/Privacy conferences
https://zhuanlan.zhihu.com/p/278495714
Goal: to provide a “secure channel” between Alice and Bob. The channel should remain secure even though Eve can inspect, modify or drop any message, and control the channel. A secure channel should:
Cryptographic key(加密密钥): A parameter that determines the functional output of a cryptographic algorithm. The only secret part of the cipher is a key.
mainly uses stream cipher or block cipher.
Encryption protects secrecy, not message integrity. For constant-size encryption, changing the ciphertext just creates a different plaintext.
Hash functions:
Message authentication code(MAC): to confirm that the message came from the stated sender (authenticity) and has not been changed (integrity)
Ref:
https://www.usenix.org/conference/osdi21/presentation/preview-security-privacy
CSCI5271 UMN
1. Security Properties
Two major-topic divisions: System security, Network security Five sub-topic areas: Software security, OS security, Cryptography, Network security, Other security topics(Web, usability, AI, etc.)
Some common Threat Models
How could attackers threat the system?
Single-Party; Centralized Trust model All the entities are in the same camp and will follow the protocol. -> will not leak data
Multi-Party; Decentralized Trust model Everybody is on their own. There might be someone potentially malicious and may not follow the protocol. -> could leak data
Multi-Party; Semi-Honest (Honest-but-curious) Multi-Party + Decentralized Trust. But entities are semi-honest(will follow the protocol, but may leak data)
Defense Strategies
How to protect user's Integrity/Confidentiality/Privacy from attacker?
2. Encryption / Secure Computation
maybe too expensive(Computation/Communication)...
Encryption
Secure Computation
3. TEE / Memory Protection
Trusted computing: From another perspective: what if I want to run my code on a platform where I don’t fully trust the owner? (eg: un-trusted public cloud) -> establish certain degrees of trust.
SGX
SGX enclave:
Memory Access Patterns
Penetration(渗透) Testing & Bug Detection