Security issues in cloud environments: a survey

DAB Fernandes, LFB Soares, JV Gomes… - International journal of …, 2014 - Springer
In the last few years, the appealing features of cloud computing have been fueling the
integration of cloud environments in the industry, which has been consequently motivating …

A guideline on pseudorandom number generation (PRNG) in the IoT

P Kietzmann, TC Schmidt, M Wählisch - ACM Computing Surveys …, 2021 - dl.acm.org
Random numbers are an essential input to many functions on the Internet of Things (IoT).
Common use cases of randomness range from low-level packet transmission to advanced …

[PDF][PDF] Mining your Ps and Qs: Detection of widespread weak keys in network devices

N Heninger, Z Durumeric, E Wustrow… - 21st USENIX Security …, 2012 - usenix.org
RSA and DSA can fail catastrophically when used with malfunctioning random number
generators, but the extent to which these problems arise in practice has never been …

Iago attacks: Why the system call API is a bad untrusted RPC interface

S Checkoway, H Shacham - ACM SIGARCH Computer Architecture …, 2013 - dl.acm.org
In recent years, researchers have proposed systems for running trusted code on an
untrusted operating system. Protection mechanisms deployed by such systems keep a …

StealthDB: a scalable encrypted database with full SQL query support

D Vinayagamurthy, A Gribov… - Proceedings on Privacy …, 2019 - petsymposium.org
Encrypted database systems provide a great method for protecting sensitive data in
untrusted infrastructures. These systems are built using either specialpurpose cryptographic …

Building enclave-native storage engines for practical encrypted databases

Y Sun, S Wang, H Li, F Li - Proceedings of the VLDB Endowment, 2021 - dl.acm.org
Data confidentiality is one of the biggest concerns that hinders enterprise customers from
moving their workloads to the cloud. Thanks to the trusted execution environment (TEE), it is …

Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices

CA Miller, Y Shi - Journal of the ACM (JACM), 2016 - dl.acm.org
Randomness is a vital resource for modern-day information processing, especially for
cryptography. A wide range of applications critically rely on abundant, high-quality random …

Honey encryption: Security beyond the brute-force bound

A Juels, T Ristenpart - Advances in Cryptology–EUROCRYPT 2014: 33rd …, 2014 - Springer
We introduce honey encryption (HE), a simple, general approach to encrypting messages
using low min-entropy keys such as passwords. HE is designed to produce a ciphertext …

Careful with composition: Limitations of the indifferentiability framework

T Ristenpart, H Shacham, T Shrimpton - … on the Theory and Applications of …, 2011 - Springer
We exhibit a hash-based storage auditing scheme which is provably secure in the random-
oracle model (ROM), but easily broken when one instead uses typical indifferentiable hash …

Why your encrypted database is not secure

P Grubbs, T Ristenpart, V Shmatikov - … of the 16th workshop on hot …, 2017 - dl.acm.org
Encrypted databases, a popular approach to protecting data from compromised database
management systems (DBMS's), use abstract threat models that capture neither realistic …