Breaking Web Applications Built On Top of Encrypted Data
Association for Computing Machinery (ACM) via YouTube
Overview
Syllabus
Intro
Our contributions
Web applications today
Solution: encrypt the data!
Example: Cloud Drive
Multi-key searchable encryption
From crypto scheme to system?
BOPET case study: Mylar
Attacks against Mylar
"Snapshot passive" threat model
The risks of metadata
Example from Mylar paper
Bigger picture on metadata
Active threat model
Plaintext recovery attack
Collusion w/ compromised client
Experiments
Powerful attack
Bigger picture on active attacks
Conclusion
Defining security for MKSE
Taught by
ACM CCS