MAGE - Nearly Zero-Cost Virtual Memory for Secure Computation

MAGE - Nearly Zero-Cost Virtual Memory for Secure Computation

USENIX via YouTube Direct link

Key Observation: SC Programs are Oblivious

7 of 18

7 of 18

Key Observation: SC Programs are Oblivious

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

MAGE - Nearly Zero-Cost Virtual Memory for Secure Computation

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Secure Computation (SC)
  3. 3 Application: Password Reuse Detection
  4. 4 Potential SC Applications
  5. 5 Memory Overhead of Secure Computation
  6. 6 Memory Can Be a Bottleneck for SC
  7. 7 Key Observation: SC Programs are Oblivious
  8. 8 SC Example: Password Reuse Detection
  9. 9 MAGE's Workflow
  10. 10 Generating a Memory Program
  11. 11 What Makes OS Virtual Memory Slow?
  12. 12 MAGE's Planner
  13. 13 Additional Challenges
  14. 14 Implementation
  15. 15 Evaluation
  16. 16 Workloads
  17. 17 Password Reuse Application
  18. 18 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.