Design space exploration and optimization of path oblivious RAM in secure processors

Keeping user data private is a huge problem both in cloud computing and computation outsourcing. One paradigm to achieve data privacy is to use tamper-resistant processors, inside which users' private data is decrypted and computed upon. These processors need to interact with untrusted external...

Full description

Bibliographic Details
Main Authors: Ren, Ling, Yu, Xiangyao, Devadas, Srinivas, Fletcher, Christopher Wardlaw, Van Dijk, Marten
Other Authors: Massachusetts Institute of Technology. Computer Science and Artificial Intelligence Laboratory
Format: Article
Language:en_US
Published: Association for Computing Machinery (ACM) 2014
Online Access:http://hdl.handle.net/1721.1/86164
https://orcid.org/0000-0001-8253-7714
https://orcid.org/0000-0003-4317-3457
https://orcid.org/0000-0003-3437-7570
https://orcid.org/0000-0002-1224-0314
https://orcid.org/0000-0003-1467-2150