Enhancing the Unlinkability of Circuit-Based Anonymous Communications with k-Funnels

V Nunes, J Brás, A Carvalho, D Barradas… - Proceedings of the …, 2023 - dl.acm.org
Anonymous communication systems are essential tools for preserving privacy and freedom
of expression. However, traffic analysis attacks make it challenging to maintain unlinkability …

Poster: Metadata-private messaging without coordination

P Jiang, Q Wang, Y Wu, C Wang - … of the 2023 ACM SIGSAC Conference …, 2023 - dl.acm.org
Metadata-private messaging (MPM) refers to an end-to-end encrypted messaging system
that protects not just the payload messages but also the privacy-revealing communication …

Aster: Fixing the android tee ecosystem with arm cca

M Kuhne, S Sridhara, A Bertschi, N Dutly… - arxiv preprint arxiv …, 2024 - arxiv.org
The Android ecosystem relies on either TrustZone (eg, OP-TEE, QTEE, Trusty) or trusted
hypervisors (pKVM, Gunyah) to isolate security-sensitive services from malicious apps and …

SIGY: Breaking Intel SGX Enclaves with Malicious Exceptions & Signals

S Sridhara, A Bertschi, B Schlüter, S Shinde - arxiv preprint arxiv …, 2024 - arxiv.org
User programs recover from hardware exceptions and respond to signals by executing
custom handlers that they register specifically for such events. We present SIGY attack …

An application of the khumbelo function on the camellia algorithm to prevent attacks in iot devices

KD Muthavhine, M Sumbwanyambe - IEEE Access, 2023 - ieeexplore.ieee.org
Camellia is an encryption algorithm implemented in many Internet of Things (IoT) devices.
However, intruders attack the Camellia cipher using Substitution Box (S-Box) distinguishers …

Metadata-Private Resource Allocation in Edge Computing Withstands Semi-Malicious Edge Nodes

Z Zhang, J Li, Y Li, Y He - Sensors, 2024 - mdpi.com
Edge computing provides higher computational power and lower transmission latency by
offloading tasks to nearby edge nodes with available computational resources to meet the …

An anonymous broadcasting system with accountability based on group signatures

H Ye, F Li - Telecommunication Systems, 2024 - Springer
Advanced anonymous communication schemes have been proposed to protect the privacy
of network users, enabling them to communicate anonymously on the Internet. However, this …

[책][B] Secure Systems from Insecure Components

E Dauterman - 2024 - search.proquest.com
In many computer systems today, an attacker that compromises just one system component
can steal many users' data. Unfortunately, past experience shows that attackers are very …