Skip to main content

Showing 1–10 of 10 results for author: Yuhala, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.08325  [pdf, other

    cs.CR

    Practical Secure Aggregation by Combining Cryptography and Trusted Execution Environments

    Authors: Romain de Laage, Peterson Yuhala, François-Xavier Wicht, Pascal Felber, Christian Cachin, Valerio Schiavoni

    Abstract: Secure aggregation enables a group of mutually distrustful parties, each holding private inputs, to collaboratively compute an aggregate value while preserving the privacy of their individual inputs. However, a major challenge in adopting secure aggregation approaches for practical applications is the significant computational overhead of the underlying cryptographic protocols, e.g. fully homomorp… ▽ More

    Submitted 11 April, 2025; originally announced April 2025.

  2. arXiv:2412.09144  [pdf, other

    cs.CR cs.AR cs.DC cs.PF

    Evaluating the Potential of In-Memory Processing to Accelerate Homomorphic Encryption

    Authors: Mpoki Mwaisela, Joel Hari, Peterson Yuhala, Jämes Ménétrey, Pascal Felber, Valerio Schiavoni

    Abstract: The widespread adoption of cloud-based solutions introduces privacy and security concerns. Techniques such as homomorphic encryption (HE) mitigate this problem by allowing computation over encrypted data without the need for decryption. However, the high computational and memory overhead associated with the underlying cryptographic operations has hindered the practicality of HE-based solutions. Wh… ▽ More

    Submitted 12 December, 2024; originally announced December 2024.

  3. Fortress: Securing IoT Peripherals with Trusted Execution Environments

    Authors: Peterson Yuhala, Jämes Ménétrey, Pascal Felber, Marcelo Pasin, Valerio Schiavoni

    Abstract: With the increasing popularity of Internet of Things (IoT) devices, securing sensitive user data has emerged as a major challenge. These devices often collect confidential information, such as audio and visual data, through peripheral inputs like microphones and cameras. Such sensitive information is then exposed to potential threats, either from malicious software with high-level access rights or… ▽ More

    Submitted 20 December, 2023; v1 submitted 5 December, 2023; originally announced December 2023.

    Comments: 8 pages

  4. A Holistic Approach for Trustworthy Distributed Systems with WebAssembly and TEEs

    Authors: Jämes Ménétrey, Aeneas Grüter, Peterson Yuhala, Julius Oeftiger, Pascal Felber, Marcelo Pasin, Valerio Schiavoni

    Abstract: Publish/subscribe systems play a key role in enabling communication between numerous devices in distributed and large-scale architectures. While widely adopted, securing such systems often trades portability for additional integrity and attestation guarantees. Trusted Execution Environments (TEEs) offer a potential solution with enclaves to enhance security and trust. However, application developm… ▽ More

    Submitted 1 December, 2023; originally announced December 2023.

    Comments: This publication incorporates results from the VEDLIoT project, which received funding from the European Union's Horizon 2020 research and innovation programme under grant agreement No 957197

    Journal ref: OPODIS'23: Proceedings of the 27th Conference on Principles of Distributed Systems, Tokyo, Japan, December 2023

  5. SecV: Secure Code Partitioning via Multi-Language Secure Values

    Authors: Peterson Yuhala, Pascal Felber, Hugo Guiroux, Jean-Pierre Lozi, Alain Tchana, Valerio Schiavoni, Gaël Thomas

    Abstract: Trusted execution environments like Intel SGX provide \emph{enclaves}, which offer strong security guarantees for applications. Running entire applications inside enclaves is possible, but this approach leads to a large trusted computing base (TCB). As such, various tools have been developed to partition programs written in languages such as C or Java into \emph{trusted} and \emph{untrusted} parts… ▽ More

    Submitted 20 December, 2023; v1 submitted 24 October, 2023; originally announced October 2023.

    Comments: 12 pages

  6. arXiv:2305.02584  [pdf, other

    cs.CR

    Enhancing IoT Security and Privacy with Trusted Execution Environments and Machine Learning

    Authors: Peterson Yuhala

    Abstract: With the increasing popularity of Internet of Things (IoT) devices, security concerns have become a major challenge: confidential information is constantly being transmitted (sometimes inadvertently) from user devices to untrusted cloud services. This work proposes a design to enhance security and privacy in IoT based systems by isolating hardware peripheral drivers in a trusted execution environm… ▽ More

    Submitted 4 May, 2023; originally announced May 2023.

    Comments: 3 pages

  7. Montsalvat: Intel SGX Shielding for GraalVM Native Images

    Authors: Peterson Yuhala, Jämes Ménétrey, Pascal Felber, Valerio Schiavoni, Alain Tchana, Gaël Thomas, Hugo Guiroux, Jean-Pierre Lozi

    Abstract: The popularity of the Java programming language has led to its wide adoption in cloud computing infrastructures. However, Java applications running in untrusted clouds are vulnerable to various forms of privileged attacks. The emergence of trusted execution environments (TEEs) such as Intel SGX mitigates this problem. TEEs protect code and data in secure enclaves inaccessible to untrusted software… ▽ More

    Submitted 20 December, 2023; v1 submitted 1 May, 2023; originally announced May 2023.

    Comments: 13 pages, Proceedings of the 22nd International Middleware Conference

  8. arXiv:2305.00763  [pdf, other

    cs.CR

    SGX Switchless Calls Made Configless

    Authors: Peterson Yuhala, Michael Paper, Timothée Zerbib, Pascal Felber, Valerio Schiavoni, Alain Tchana

    Abstract: Intel's software guard extensions (SGX) provide hardware enclaves to guarantee confidentiality and integrity for sensitive code and data. However, systems leveraging such security mechanisms must often pay high performance overheads. A major source of this overhead is SGX enclave transitions which induce expensive cross-enclave context switches. The Intel SGX SDK mitigates this with a switchless c… ▽ More

    Submitted 7 July, 2023; v1 submitted 1 May, 2023; originally announced May 2023.

    Comments: 10 pages, 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

  9. arXiv:2104.02987  [pdf, other

    cs.CR cs.LG

    Plinius: Secure and Persistent Machine Learning Model Training

    Authors: Peterson Yuhala, Pascal Felber, Valerio Schiavoni, Alain Tchana

    Abstract: With the increasing popularity of cloud based machine learning (ML) techniques there comes a need for privacy and integrity guarantees for ML data. In addition, the significant scalability challenges faced by DRAM coupled with the high access-times of secondary storage represent a huge performance bottleneck for ML systems. While solutions exist to tackle the security aspect, performance remains a… ▽ More

    Submitted 8 April, 2021; v1 submitted 7 April, 2021; originally announced April 2021.

  10. arXiv:2006.00380  [pdf, ps, other

    cs.OS

    Memory virtualization in virtualized systems: segmentation is better than paging

    Authors: Boris Teabe, Peterson Yuhala, Alain Tchana, Fabien Hermenier, Daniel Hagimont, Gilles Muller

    Abstract: The utilization of paging for virtual machine (VM) memory management is the root cause of memory virtualization overhead. This paper shows that paging is not necessary in the hypervisor. In fact, memory fragmentation, which explains paging utilization, is not an issue in virtualized datacenters thanks to VM memory demand patterns. Our solution Compromis, a novel Memory Management Unit, uses direct… ▽ More

    Submitted 30 May, 2020; originally announced June 2020.