Skip to main content

Showing 1–3 of 3 results for author: Drean, J

.
  1. arXiv:2412.03550  [pdf, other

    cs.CR

    Teaching an Old Dog New Tricks: Verifiable FHE Using Commodity Hardware

    Authors: Jules Drean, Fisher Jepsen, Edward Suh, Srini Devadas, Aamer Jaleel, Gururaj Saileshwar

    Abstract: We present Argos, a simple approach for adding verifiability to fully homomorphic encryption (FHE) schemes using trusted hardware. Traditional approaches to verifiable FHE require expensive cryptographic proofs, which incur an overhead of up to seven orders of magnitude on top of FHE, making them impractical. With Argos, we show that trusted hardware can be securely used to provide verifiability… ▽ More

    Submitted 24 March, 2025; v1 submitted 4 December, 2024; originally announced December 2024.

  2. arXiv:2306.14882  [pdf, other

    cs.CR cs.AR

    Citadel: Simple Spectre-Safe Isolation For Real-World Programs That Share Memory

    Authors: Jules Drean, Miguel Gomez-Garcia, Fisher Jepsen, Thomas Bourgeat, Srinivas Devadas

    Abstract: Transient execution side-channel attacks, such as Spectre, have been shown to break almost all isolation primitives. We introduce a new security property we call relaxed microarchitectural isolation (RMI) that allows sensitive programs that are not-constant-time to share memory with an attacker while restricting the information leakage to that of non-speculative execution. Although this type of sp… ▽ More

    Submitted 6 February, 2025; v1 submitted 26 June, 2023; originally announced June 2023.

  3. arXiv:1812.10605  [pdf, other

    cs.CR

    Sanctorum: A lightweight security monitor for secure enclaves

    Authors: Ilia Lebedev, Kyle Hogan, Jules Drean, David Kohlbrenner, Dayeol Lee, Krste Asanović, Dawn Song, Srinivas Devadas

    Abstract: Enclaves have emerged as a particularly compelling primitive to implement trusted execution environments: strongly isolated sensitive user-mode processes in a largely untrusted software environment. While the threat models employed by various enclave systems differ, the high-level guarantees they offer are essentially the same: attestation of an enclave's initial state, as well as a guarantee of e… ▽ More

    Submitted 26 December, 2018; originally announced December 2018.

    Comments: 6 pages