Proceedings of the 2013 ACM SIGSAC Conference on Computer &Amp; Communications Security - CCS '13 2013
DOI: 10.1145/2508859.2516692
|View full text |Cite
|
Sign up to set email alerts
|

Phantom

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 143 publications
(10 citation statements)
references
References 62 publications
0
10
0
Order By: Relevance
“…Mass et al [27] were the first to introduce tree top caching. In tree top caching the top k levels of the ORAM tree are cached in the stash.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Mass et al [27] were the first to introduce tree top caching. In tree top caching the top k levels of the ORAM tree are cached in the stash.…”
Section: Related Workmentioning
confidence: 99%
“…They proposed caching the top k levels of the tree. We will adopt the same technique proposed by Mass et al [27]. However, we will only cache the root bucket as we intend to make it larger than all the other buckets.…”
Section: Related Workmentioning
confidence: 99%
“…Maas et al [31] introduced the first Path ORAM implementation on hardware. They named it Parallel Hardware to make Applications Non-leaky Through Oblivious Memory (Phantom).…”
Section: Related Workmentioning
confidence: 99%
“…These top three levels only contain seven buckets. We could have just read the first three levels and saved them in the stash by using the tree-top caching technique proposed by Maas et al [31]. Moreover, the problem was formulated as a partition problem making it an NP-hard problem.…”
Section: Related Workmentioning
confidence: 99%
“…Protection from information leakage from memory access patterns is a long recognized issue that is solved by cryptographic techniques like oblivious RAM [21][22][23][24][25] and private information retrieval (PIR) [26][27][28][29]. Both can be used in a black-box manner to resolve the above issues, yet the concrete selection of a scheme and analysis of security and complexity impacts is beyond the scope of this article (subject of future research).…”
Section: Fixing Memory Access and Branching Leakagesmentioning
confidence: 99%