Breaking Web Applications Built On Top of Encrypted Data

Breaking Web Applications Built On Top of Encrypted Data

ACM CCS via YouTube Direct link

Example: Cloud Drive

5 of 21

5 of 21

Example: Cloud Drive

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Breaking Web Applications Built On Top of Encrypted Data

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Our contributions
  3. 3 Web applications today
  4. 4 Solution: encrypt the data!
  5. 5 Example: Cloud Drive
  6. 6 Multi-key searchable encryption
  7. 7 From crypto scheme to system?
  8. 8 BOPET case study: Mylar
  9. 9 Attacks against Mylar
  10. 10 "Snapshot passive" threat model
  11. 11 The risks of metadata
  12. 12 Example from Mylar paper
  13. 13 Bigger picture on metadata
  14. 14 Active threat model
  15. 15 Plaintext recovery attack
  16. 16 Collusion w/ compromised client
  17. 17 Experiments
  18. 18 Powerful attack
  19. 19 Bigger picture on active attacks
  20. 20 Conclusion
  21. 21 Defining security for MKSE

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.