2023
DOI: 10.48550/arxiv.2301.08148
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

OblivIO: Securing reactive programs by oblivious execution with bounded traffic overheads

Abstract: Traffic analysis attacks remain a significant problem for online security. Communication between nodes can be observed by network level attackers as it inherently takes place in the open. Despite online services increasingly using encrypted traffic, the shape of the traffic is not hidden. To prevent traffic analysis, the shape of a system's traffic must be independent of secrets.We investigate adapting the data-oblivious approach the reactive setting and present OblivIO, a secure language for writing reactive … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 32 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?