Completed
Solution: encrypt the data!
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Breaking Web Applications Built On Top of Encrypted Data
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Our contributions
- 3 Web applications today
- 4 Solution: encrypt the data!
- 5 Example: Cloud Drive
- 6 Multi-key searchable encryption
- 7 From crypto scheme to system?
- 8 BOPET case study: Mylar
- 9 Attacks against Mylar
- 10 "Snapshot passive" threat model
- 11 The risks of metadata
- 12 Example from Mylar paper
- 13 Bigger picture on metadata
- 14 Active threat model
- 15 Plaintext recovery attack
- 16 Collusion w/ compromised client
- 17 Experiments
- 18 Powerful attack
- 19 Bigger picture on active attacks
- 20 Conclusion
- 21 Defining security for MKSE