Skip to main content

Showing 1–31 of 31 results for author: Devadas, S

.
  1. arXiv:2412.03550  [pdf, other

    cs.CR

    Teaching an Old Dog New Tricks: Verifiable FHE Using Commodity Hardware

    Authors: Jules Drean, Fisher Jepsen, Edward Suh, Srini Devadas, Aamer Jaleel, Gururaj Saileshwar

    Abstract: We present Argos, a simple approach for adding verifiability to fully homomorphic encryption (FHE) schemes using trusted hardware. Traditional approaches to verifiable FHE require expensive cryptographic proofs, which incur an overhead of up to seven orders of magnitude on top of FHE, making them impractical. With Argos, we show that trusted hardware can be securely used to provide verifiability… ▽ More

    Submitted 24 March, 2025; v1 submitted 4 December, 2024; originally announced December 2024.

  2. arXiv:2408.12576  [pdf, ps, other

    math.AG

    Higher-weight Jacobians

    Authors: Sheela Devadas, Max Lieblich

    Abstract: We define and study Jacobians of Hodge structures with weight greater than 1. Jacobians of weight 2 naturally come up in the context of the Brauer group and the Tate conjecture. They were previously studied in a special case by Beauville in his work on surfaces of maximal Picard number, and are related to the work of Totaro on Hodge structures with no middle pieces. Higher-weight Jacobians are com… ▽ More

    Submitted 9 February, 2025; v1 submitted 22 August, 2024; originally announced August 2024.

    Comments: v4: change Corollary 2.7 and Proposition 2.8. 28 pages including appendix

  3. arXiv:2309.02672  [pdf, other

    cs.CR cs.IT

    Geometry of Sensitivity: Twice Sampling and Hybrid Clipping in Differential Privacy with Optimal Gaussian Noise and Application to Deep Learning

    Authors: Hanshen Xiao, Jun Wan, Srinivas Devadas

    Abstract: We study the fundamental problem of the construction of optimal randomization in Differential Privacy. Depending on the clipping strategy or additional properties of the processing function, the corresponding sensitivity set theoretically determines the necessary randomization to produce the required security parameters. Towards the optimal utility-privacy tradeoff, finding the minimal perturbatio… ▽ More

    Submitted 28 September, 2023; v1 submitted 5 September, 2023; originally announced September 2023.

    Journal ref: ACM CCS 2023

  4. arXiv:2306.14882  [pdf, other

    cs.CR cs.AR

    Citadel: Simple Spectre-Safe Isolation For Real-World Programs That Share Memory

    Authors: Jules Drean, Miguel Gomez-Garcia, Fisher Jepsen, Thomas Bourgeat, Srinivas Devadas

    Abstract: Transient execution side-channel attacks, such as Spectre, have been shown to break almost all isolation primitives. We introduce a new security property we call relaxed microarchitectural isolation (RMI) that allows sensitive programs that are not-constant-time to share memory with an attacker while restricting the information leakage to that of non-speculative execution. Although this type of sp… ▽ More

    Submitted 6 February, 2025; v1 submitted 26 June, 2023; originally announced June 2023.

  5. GAGA for Henselian schemes

    Authors: Sheela Devadas

    Abstract: The global analogue of a Henselian local ring is a Henselian pair-a ring R and an ideal I which satisfy a condition resembling Hensel's lemma regarding lifting coprime factorizations of monic polynomials over R/I to factorizations over R. The geometric counterpart is the notion of a Henselian scheme, which can serve as a substitute for formal schemes in applications such as deformation theory. In… ▽ More

    Submitted 28 January, 2025; v1 submitted 2 June, 2023; originally announced June 2023.

    Comments: To appear in Journal of the Institute of Mathematics of Jussieu. Minor change to Theorem 3.6.2. 48 pages (including appendix)

    MSC Class: 14A20; 13J15

    Journal ref: J. Inst. Math. Jussieu 24 (2025) 1547-1589

  6. arXiv:2212.08644  [pdf, ps, other

    math.AG math.NT

    Henselian schemes in positive characteristic

    Authors: Sheela Devadas

    Abstract: The global analogue of a Henselian local ring is a Henselian pair: a ring A and an ideal I which satisfy a condition resembling Hensel's lemma regarding lifting coprime factorizations of polynomials over A/I to factorizations over A. The geometric counterpart is the notion of a Henselian scheme, which is an analogue of a tubular neighborhood in algebraic geometry. In this paper we revisit the fo… ▽ More

    Submitted 23 June, 2024; v1 submitted 16 December, 2022; originally announced December 2022.

    Comments: v3: 55 pages (including appendix). edited: proof of Corollary 6.11, some bibliography entries

    MSC Class: 14A20; 13J15

  7. arXiv:2212.02312  [pdf

    physics.optics gr-qc

    Microscopic study of effective 2+1 dimensional gravity in ferrofluid-based hyperbolic metamaterials

    Authors: Vera N. Smolyaninova, Jonathon Cartelli, Nathaniel Christopher, Benjamin Kist, Jonathan Perry, Stephanie Spickard, Mary Sajini Devadas, Igor I. Smolyaninov

    Abstract: Recent theoretical and experimental work demonstrated that nonlinear optics of ferrofluid-based hyperbolic metamaterials exhibits very unusual 2+2-dimensional spatiotemporal dynamics. Here we report a detailed microscopic study of mutual interactions of individual self-focused optical filaments inside this metamaterial. In agreement with theoretical expectations, the observed mutual interactions o… ▽ More

    Submitted 2 December, 2022; originally announced December 2022.

    Comments: 17 pages, 4 figures

  8. arXiv:2210.03843  [pdf, other

    cs.LG cs.CR

    Differentially Private Deep Learning with ModelMix

    Authors: Hanshen Xiao, Jun Wan, Srinivas Devadas

    Abstract: Training large neural networks with meaningful/usable differential privacy security guarantees is a demanding challenge. In this paper, we tackle this problem by revisiting the two key operations in Differentially Private Stochastic Gradient Descent (DP-SGD): 1) iterative perturbation and 2) gradient clipping. We propose a generic optimization framework, called {\em ModelMix}, which performs rando… ▽ More

    Submitted 7 October, 2022; originally announced October 2022.

  9. arXiv:2210.03458  [pdf, ps, other

    cs.CR cs.IT

    PAC Privacy: Automatic Privacy Measurement and Control of Data Processing

    Authors: Hanshen Xiao, Srinivas Devadas

    Abstract: We propose and study a new privacy definition, termed Probably Approximately Correct (PAC) Privacy. PAC Privacy characterizes the information-theoretic hardness to recover sensitive data given arbitrary information disclosure/leakage during/after any processing. Unlike the classic cryptographic definition and Differential Privacy (DP), which consider the adversarial (input-independent) worst case,… ▽ More

    Submitted 19 June, 2023; v1 submitted 7 October, 2022; originally announced October 2022.

  10. arXiv:2204.04489  [pdf, other

    cs.NI cs.CR

    ShorTor: Improving Tor Network Latency via Multi-hop Overlay Routing

    Authors: Kyle Hogan, Sacha Servan-Schreiber, Zachary Newman, Ben Weintraub, Cristina Nita-Rotaru, Srinivas Devadas

    Abstract: We present ShorTor, a protocol for reducing latency on the Tor network. ShorTor uses multi-hop overlay routing, a technique typically employed by content delivery networks, to influence the route Tor traffic takes across the internet. ShorTor functions as an overlay on top of onion routing-Tor's existing routing protocol and is run by Tor relays, making it independent of the path selection perform… ▽ More

    Submitted 9 April, 2022; originally announced April 2022.

  11. arXiv:2109.05371  [pdf, other

    cs.CR cs.AR

    F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption (Extended Version)

    Authors: Axel Feldmann, Nikola Samardzic, Aleksandar Krastev, Srini Devadas, Ron Dreslinski, Karim Eldefrawy, Nicholas Genise, Chris Peikert, Daniel Sanchez

    Abstract: Fully Homomorphic Encryption (FHE) allows computing on encrypted data, enabling secure offloading of computation to untrusted serves. Though it provides ideal security, FHE is expensive when executed in software, 4 to 5 orders of magnitude slower than computing on unencrypted data. These overheads are a major barrier to FHE's widespread adoption. We present F1, the first FHE accelerator that is pr… ▽ More

    Submitted 25 September, 2021; v1 submitted 11 September, 2021; originally announced September 2021.

  12. arXiv:2010.11082  [pdf, ps, other

    cs.LG cs.CR stat.ML

    On Differentially Private Stochastic Convex Optimization with Heavy-tailed Data

    Authors: Di Wang, Hanshen Xiao, Srini Devadas, Jinhui Xu

    Abstract: In this paper, we consider the problem of designing Differentially Private (DP) algorithms for Stochastic Convex Optimization (SCO) on heavy-tailed data. The irregularity of such data violates some key assumptions used in almost all existing DP-SCO and DP-ERM methods, resulting in failure to provide the DP guarantees. To better understand this type of challenges, we provide in this paper a compreh… ▽ More

    Submitted 21 October, 2020; originally announced October 2020.

    Comments: Published in ICML 2020

  13. arXiv:2010.06760  [pdf, other

    cs.DB

    Taurus: Lightweight Parallel Logging for In-Memory Database Management Systems (Extended Version)

    Authors: Yu Xia, Xiangyao Yu, Andrew Pavlo, Srinivas Devadas

    Abstract: Existing single-stream logging schemes are unsuitable for in-memory database management systems (DBMSs) as the single log is often a performance bottleneck. To overcome this problem, we present Taurus, an efficient parallel logging scheme that uses multiple log streams, and is compatible with both data and command logging. Taurus tracks and encodes transaction dependencies using a vector of log se… ▽ More

    Submitted 13 October, 2020; originally announced October 2020.

  14. arXiv:2003.01564  [pdf

    physics.optics gr-qc

    Experimental observation of effective gravity and two times physics in ferrofluid-based hyperbolic metamaterials

    Authors: V. N. Smolyaninova, J. Cartelli, B. Augstein, S. Spickard, M. S. Devadas, I. I. Smolyaninov

    Abstract: Recently it was proposed that extraordinary light waves in hyperbolic metamaterials exhibit two times physics behavior (Phys. Rev. Lett. 105, 067402, 2010). We report experimental observation of this effect via investigation of gravity-like nonlinear optics of iron/cobalt-based ferrofluid hyperbolic metamaterials. In addition to conventional temporal coordinate, the spatial coordinate oriented alo… ▽ More

    Submitted 20 August, 2020; v1 submitted 2 March, 2020; originally announced March 2020.

    Comments: 23 pages, 4 figures, this version is accepted for publication in Advanced Photonics

    Journal ref: Advanced Photonics 2, 056001 (2020)

  15. arXiv:1902.06101  [pdf, other

    math.OC cs.CR cs.LG

    Local Differential Privacy in Decentralized Optimization

    Authors: Hanshen Xiao, Yu Ye, Srinivas Devadas

    Abstract: Privacy concerns with sensitive data are receiving increasing attention. In this paper, we study local differential privacy (LDP) in interactive decentralized optimization. By constructing random local aggregators, we propose a framework to amplify LDP by a constant. We take Alternating Direction Method of Multipliers (ADMM), and decentralized gradient descent as two concrete examples, where exper… ▽ More

    Submitted 1 June, 2019; v1 submitted 16 February, 2019; originally announced February 2019.

  16. arXiv:1901.04368  [pdf, other

    cs.CR

    XRD: Scalable Messaging System with Cryptographic Privacy

    Authors: Albert Kwon, David Lu, Srinivas Devadas

    Abstract: Even as end-to-end encrypted communication becomes more popular, private messaging remains a challenging problem due to metadata leakages, such as who is communicating with whom. Most existing systems that hide communication metadata either (1) do not scale easily, (2) incur significant overheads, or (3) provide weaker guarantees than cryptographic privacy, such as differential privacy or heuristi… ▽ More

    Submitted 14 January, 2019; originally announced January 2019.

  17. arXiv:1812.10605  [pdf, other

    cs.CR

    Sanctorum: A lightweight security monitor for secure enclaves

    Authors: Ilia Lebedev, Kyle Hogan, Jules Drean, David Kohlbrenner, Dayeol Lee, Krste Asanović, Dawn Song, Srinivas Devadas

    Abstract: Enclaves have emerged as a particularly compelling primitive to implement trusted execution environments: strongly isolated sensitive user-mode processes in a largely untrusted software environment. While the threat models employed by various enclave systems differ, the high-level guarantees they offer are essentially the same: attestation of an enclave's initial state, as well as a guarantee of e… ▽ More

    Submitted 26 December, 2018; originally announced December 2018.

    Comments: 6 pages

  18. arXiv:1812.09822  [pdf, other

    cs.CR cs.OS

    MI6: Secure Enclaves in a Speculative Out-of-Order Processor

    Authors: Thomas Bourgeat, Ilia Lebedev, Andrew Wright, Sizhuo Zhang, Arvind, Srinivas Devadas

    Abstract: Recent attacks have broken process isolation by exploiting microarchitectural side channels that allow indirect access to shared microarchitectural state. Enclaves strengthen the process abstraction to restore isolation guarantees. We propose MI6, an aggressive, speculative out-of-order processor capable of providing secure enclaves under a threat model that includes an untrusted OS and an attac… ▽ More

    Submitted 29 August, 2019; v1 submitted 23 December, 2018; originally announced December 2018.

    Comments: 15 pages

  19. Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning

    Authors: Sanjit Bhat, David Lu, Albert Kwon, Srinivas Devadas

    Abstract: In recent years, there have been several works that use website fingerprinting techniques to enable a local adversary to determine which website a Tor user visits. While the current state-of-the-art attack, which uses deep learning, outperforms prior art with medium to large amounts of data, it attains marginal to no accuracy improvements when both use small amounts of training data. In this work,… ▽ More

    Submitted 23 July, 2019; v1 submitted 27 February, 2018; originally announced February 2018.

    Comments: Original paper split into "Var-CNN: A Data-Efficient Website Fingerprinting Attack Based on Deep Learning" (PETS 2019) and "DynaFlow: An Efficient Website Fingerprinting Defense Based on Dynamically-Adjusting Flows" (WPES 2018)

    Journal ref: Proceedings on Privacy Enhancing Technologies. 2019 (4):292-310

  20. arXiv:1704.02677  [pdf, other

    cs.AR

    Banshee: Bandwidth-Efficient DRAM Caching Via Software/Hardware Cooperation

    Authors: Xiangyao Yu, Christopher J. Hughes, Nadathur Satish, Onur Mutlu, Srinivas Devadas

    Abstract: Putting the DRAM on the same package with a processor enables several times higher memory bandwidth than conventional off-package DRAM. Yet, the latency of in-package DRAM is not appreciably lower than that of off-package DRAM. A promising use of in-package DRAM is as a large cache. Unfortunately, most previous DRAM cache designs mainly optimize for hit latency and do not consider off-chip bandwid… ▽ More

    Submitted 9 April, 2017; originally announced April 2017.

    Comments: 12 pages

  21. arXiv:1704.02397  [pdf, other

    cs.DC cs.CR

    Efficient Synchronous Byzantine Consensus

    Authors: Ittai Abraham, Srinivas Devadas, Danny Dolev, Kartik Nayak, Ling Ren

    Abstract: We present new protocols for Byzantine state machine replication and Byzantine agreement in the synchronous and authenticated setting. The celebrated PBFT state machine replication protocol tolerates $f$ Byzantine faults in an asynchronous setting using $3f+1$ replicas, and has since been studied or deployed by numerous works. In this work, we improve the Byzantine fault tolerance threshold to… ▽ More

    Submitted 12 September, 2017; v1 submitted 7 April, 2017; originally announced April 2017.

  22. arXiv:1612.07841  [pdf, other

    cs.CR

    Atom: Horizontally Scaling Strong Anonymity

    Authors: Albert Kwon, Henry Corrigan-Gibbs, Srinivas Devadas, Bryan Ford

    Abstract: Atom is an anonymous messaging system that protects against traffic-analysis attacks. Unlike many prior systems, each Atom server touches only a small fraction of the total messages routed through the network. As a result, the system's capacity scales near-linearly with the number of servers. At the same time, each Atom user benefits from "best possible" anonymity: a user is anonymous among all ho… ▽ More

    Submitted 2 October, 2017; v1 submitted 22 December, 2016; originally announced December 2016.

  23. arXiv:1511.08774  [pdf, other

    cs.AR

    Tardis 2.0: Optimized Time Traveling Coherence for Relaxed Consistency Models

    Authors: Xiangyao Yu, Hongzhe Liu, Ethan Zou, Srinivas Devadas

    Abstract: Cache coherence scalability is a big challenge in shared memory systems. Traditional protocols do not scale due to the storage and traffic overhead of cache invalidation. Tardis, a recently proposed coherence protocol, removes cache invalidation using logical timestamps and achieves excellent scalability. The original Tardis protocol, however, only supports the Sequential Consistency (SC) memory m… ▽ More

    Submitted 27 July, 2016; v1 submitted 27 November, 2015; originally announced November 2015.

    Comments: 14 pages

  24. The polynomial representation of the type $A_{n - 1}$ rational Cherednik algebra in characteristic $p \mid n$

    Authors: Sheela Devadas, Yi Sun

    Abstract: We study the polynomial representation of the rational Cherednik algebra of type $A_{n-1}$ with generic parameter in characteristic $p$ for $p \mid n$. We give explicit formulas for generators for the maximal proper graded submodule, show that they cut out a complete intersection, and thus compute the Hilbert series of the irreducible quotient. Our methods are motivated by taking characteristic… ▽ More

    Submitted 12 May, 2016; v1 submitted 28 May, 2015; originally announced May 2015.

    Comments: 8 pages. v3: Streamlined proof of complete intersection property in Section 3; main results are unchanged

    Journal ref: Commun. Algebra 45 (2016), 1926-1934

  25. arXiv:1505.06459  [pdf, other

    cs.DC

    A Proof of Correctness for the Tardis Cache Coherence Protocol

    Authors: Xiangyao Yu, Muralidaran Vijayaraghavan, Srinivas Devadas

    Abstract: We prove the correctness of a recently-proposed cache coherence protocol, Tardis, which is simple, yet scalable to high processor counts, because it only requires O(logN) storage per cacheline for an N-processor system. We prove that Tardis follows the sequential consistency model and is both deadlock- and livelock-free. Our proof is based on simple and intuitive invariants of the system and thus… ▽ More

    Submitted 24 May, 2015; originally announced May 2015.

    Comments: 16 pages, 2 figures

  26. arXiv:1501.04504  [pdf, other

    cs.DC

    TARDIS: Timestamp based Coherence Algorithm for Distributed Shared Memory

    Authors: Xiangyao Yu, Srinivas Devadas

    Abstract: A new memory coherence protocol, Tardis, is proposed. Tardis uses timestamp counters representing logical time as well as physical time to order memory operations and enforce sequential consistency in any type of shared memory system. Tardis is unique in that as compared to the widely-adopted directory coherence protocol, and its variants, it completely avoids multicasting and only requires O(log… ▽ More

    Submitted 23 September, 2015; v1 submitted 19 January, 2015; originally announced January 2015.

    Comments: 16 pages

  27. A Self-Tester for Linear Functions over the Integers with an Elementary Proof of Correctness

    Authors: Sheela Devadas, Ronitt Rubinfeld

    Abstract: We present simple, self-contained proofs of correctness for algorithms for linearity testing and program checking of linear functions on finite subsets of integers represented as n-bit numbers. In addition we explore a generalization of self-testing to homomorphisms on a multidimensional vector space. We show that our self-testing algorithm for the univariate case can be directly generalized to ve… ▽ More

    Submitted 22 June, 2015; v1 submitted 17 December, 2014; originally announced December 2014.

  28. Representations of rational Cherednik algebras of G(m,r,n) in positive characteristic

    Authors: Sheela Devadas, Steven V Sam

    Abstract: We study lowest-weight irreducible representations of rational Cherednik algebras attached to the complex reflection groups G(m,r,n) in characteristic p. Our approach is mostly from the perspective of commutative algebra. By studying the kernel of the contravariant bilinear form on Verma modules, we obtain formulas for Hilbert series of irreducible representations in a number of cases, and present… ▽ More

    Submitted 13 October, 2013; v1 submitted 3 April, 2013; originally announced April 2013.

    Comments: 23 pages; v2: clarified statement of Lemma 3.2

    MSC Class: 13A50; 14N20; 16S99

    Journal ref: J. Commut. Algebra 6 (2014), no. 4, 525-559

  29. arXiv:1202.5150  [pdf, other

    cs.CR

    Path ORAM: An Extremely Simple Oblivious RAM Protocol

    Authors: Emil Stefanov, Marten van Dijk, Elaine Shi, T-H. Hubert Chan, Christopher Fletcher, Ling Ren, Xiangyao Yu, Srinivas Devadas

    Abstract: We present Path ORAM, an extremely simple Oblivious RAM protocol with a small amount of client storage. Partly due to its simplicity, Path ORAM is the most practical ORAM scheme known to date with small client storage. We formally prove that Path ORAM has a O(log N) bandwidth cost for blocks of size B = Omega(log^2 N) bits. For such block sizes, Path ORAM is asymptotically better than the best kno… ▽ More

    Submitted 13 January, 2014; v1 submitted 23 February, 2012; originally announced February 2012.

  30. arXiv:cs/0605109  [pdf, ps, other

    cs.CR cs.SE

    Knowledge Flow Analysis for Security Protocols

    Authors: Emina Torlak, Marten van Dijk, Blaise Gassend, Daniel Jackson, Srinivas Devadas

    Abstract: Knowledge flow analysis offers a simple and flexible way to find flaws in security protocols. A protocol is described by a collection of rules constraining the propagation of knowledge amongst principals. Because this characterization corresponds closely to informal descriptions of protocols, it allows a succinct and natural formalization; because it abstracts away message ordering, and handles… ▽ More

    Submitted 24 May, 2006; originally announced May 2006.

    Comments: 20 pages

    Report number: MIT-CSAIL-TR-2005-066

  31. arXiv:cs/0605097  [pdf, ps, other

    cs.CR

    A Generalized Two-Phase Analysis of Knowledge Flows in Security Protocols

    Authors: Marten van Dijk, Emina Torlak, Blaise Gassend, Srinivas Devadas

    Abstract: We introduce knowledge flow analysis, a simple and flexible formalism for checking cryptographic protocols. Knowledge flows provide a uniform language for expressing the actions of principals, assump- tions about intruders, and the properties of cryptographic primitives. Our approach enables a generalized two-phase analysis: we extend the two-phase theory by identifying the necessary and suffici… ▽ More

    Submitted 22 May, 2006; originally announced May 2006.

    Comments: 16 pages