Skip to main content

Showing 1–4 of 4 results for author: Poddar, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2010.13752  [pdf, other

    cs.CR

    Senate: A Maliciously-Secure MPC Platform for Collaborative Analytics

    Authors: Rishabh Poddar, Sukrit Kalra, Avishay Yanai, Ryan Deng, Raluca Ada Popa, Joseph M. Hellerstein

    Abstract: Many organizations stand to benefit from pooling their data together in order to draw mutually beneficial insights -- e.g., for fraud detection across banks, better medical studies across hospitals, etc. However, such organizations are often prevented from sharing their data with each other by privacy concerns, regulatory hurdles, or business competition. We present Senate, a system that allows mu… ▽ More

    Submitted 26 October, 2020; originally announced October 2020.

    Comments: USENIX Security 2021

  2. arXiv:2010.02524  [pdf, other

    cs.CR

    Secure Collaborative Training and Inference for XGBoost

    Authors: Andrew Law, Chester Leung, Rishabh Poddar, Raluca Ada Popa, Chenyu Shi, Octavian Sima, Chaofan Yu, Xingmeng Zhang, Wenting Zheng

    Abstract: In recent years, gradient boosted decision tree learning has proven to be an effective method of training robust models. Moreover, collaborative learning among multiple parties has the potential to greatly benefit all parties involved, but organizations have also encountered obstacles in sharing sensitive data due to business, regulatory, and liability concerns. We propose Secure XGBoost, a priv… ▽ More

    Submitted 6 October, 2020; originally announced October 2020.

    Comments: ACM CCS PPMLP'20

  3. arXiv:2008.06627  [pdf, other

    cs.CR

    Practical Volume-Based Attacks on Encrypted Databases

    Authors: Rishabh Poddar, Stephanie Wang, Jianan Lu, Raluca Ada Popa

    Abstract: Recent years have seen an increased interest towards strong security primitives for encrypted databases (such as oblivious protocols), that hide the access patterns of query execution, and reveal only the volume of results. However, recent work has shown that even volume leakage can enable the reconstruction of entire columns in the database. Yet, existing attacks rely on a set of assumptions that… ▽ More

    Submitted 14 August, 2020; originally announced August 2020.

    Comments: IEEE EuroS&P 2020

  4. arXiv:2006.09628  [pdf, other

    cs.CR cs.CV

    Visor: Privacy-Preserving Video Analytics as a Cloud Service

    Authors: Rishabh Poddar, Ganesh Ananthanarayanan, Srinath Setty, Stavros Volos, Raluca Ada Popa

    Abstract: Video-analytics-as-a-service is becoming an important offering for cloud providers. A key concern in such services is privacy of the videos being analyzed. While trusted execution environments (TEEs) are promising options for preventing the direct leakage of private video content, they remain vulnerable to side-channel attacks. We present Visor, a system that provides confidentiality for the use… ▽ More

    Submitted 23 June, 2020; v1 submitted 16 June, 2020; originally announced June 2020.

    Comments: USENIX Security 2020