log in  |  register  |  feedback?  |  help  |  web accessibility
Logo
MC2 Internal Seminars
Dana Dachman-Soled and Charalampos (Babis) Papamanthou - Electrical and Computer Engineering and Maryland Cybersecurity Center
Friday, October 4, 2013, 11:45 am-1:00 pm Calendar
  • You are subscribed to this talk through .
  • You are watching this talk through .
  • You are subscribed to this talk. (unsubscribe, watch)
  • You are watching this talk. (unwatch, subscribe)
  • You are not subscribed to this talk. (watch, subscribe)
Registration requested: The organizer of this talk requests that you register if you are planning to attend. There are two ways to register: (1) You can create an account on this site (click the "register" link in the upper-right corner) and then register for this talk; or (2) You can enter your details below and click the "Register for talk" button. Either way, you can always cancel your registration later.

Name:
Email:
Organization:

Abstract

Dana Dachman-Soled

Title: Cryptography Against Physical Attacks: Recent Results and New Directions

Physical attacks compromise the security of a system by exploiting physical properties of implementations. These implementation-specific attacks, such as timing attacks and fault-induction attacks, have been launched successfully on real-life cryptosystems such as RSA, revealing a significant vulnerability of these systems. Until recently, physical attacks have been dealt with in an ad-hoc manner. In recent years, however, much attention in the cryptographic community has focused on how to model physical attacks and construct cryptographic schemes that are provably secure in these strong models.

In this talk, we present our recent results related to constructing cryptographic schemes resilient to leakage and tampering attacks. First, we present results on “circuit compilers” for tampering, which allow us to take any circuit and convert it into a modified circuit which has strong tamper-resilience properties. Next, we consider constructing protocols for performing computations in an untrusted, distributed setting, where an attacker may additionally launch leakage attacks on honest parties. In the final part of the talk, we discuss directions for current and future research.

 

Charalampos (Babis) Papamanthou

In the age of big data, cloud computing plays a major role in processing and analyzing massive amounts of information. Services like Amazon S3 and EC2 offer easily accessible outsourced storage and computation, gradually replacing our local hard drives and desktop machines. Nevertheless, many security concerns have arisen in this new paradigm. In an untrusted cloud setting, users' data and computations can be potentially tampered with and sensitive data could be leaked to unauthorized parties.

In this talk, I will present some of my work that tackles the above mentioned problems through protocols and systems that offer verifiability and privacy assurances of data and computations in the cloud (or generally in untrusted environments). Specifically I will review some of my work on securing storage applications efficiently and on applied cryptographic techniques for verifying more expressive queries than simple storage queries. I will also show that my protocols are efficient both in theory and in practice and conclude by highlighting some of my recent work on cloud privacy concerning efficient and parallel searching of dynamic encrypted data and by summarizing future research directions.

 

Bio

Dana Dachman-Soled

Dana Dachman-Soled recently joined the Department of Electrical and Computer Engineering at the University of Maryland, College Park as an assistant professor. She is also affiliated with UMIACS and the Maryland Cybersecurity Center.  Dana works on a broad range of problems in cryptography such as security against physical attacks, secure multiparty computation and foundational problems.  While her main research area is cryptography, she also has interests in complexity theory and security.  Prior to joining University of Maryland, Dana spent two years as a postdoc at Microsoft Research New England.  She completed her PhD at Columbia University in 2011 where she was a recipient of the FF SEAS Presidential Fellowship.

 

Charalampos (Babis) Papamanthou

Charalampos (Babis) Papamanthou is an assistant professor in the ECE department at the University of Maryland, College Park, where he joined after a postdoc at UC Berkeley. He works on the areas of applied cryptography and computer security—and especially on technologies, systems and theory for secure and private cloud computing.

He obtained his PhD and MSc in Computer Science from Brown University in 2007 and 2011 respectively, where he was advised by Roberto Tamassia. While at Brown, he was the recipient of the Kanellakis and van Dam fellowships and he also interned at Intel Research (2008) and Microsoft Research (2010). Before graduate school, he studied in Greece at the University of Crete (MSc) and the University of Macedonia (BSc). He has published in venues and journals spanning theoretical and applied cryptography, systems and database security, graph algorithms and visualization and operations research.

 

This talk is organized by Carolyn Flowers