Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

The Shadow Nemesis - Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption

Association for Computing Machinery (ACM) via YouTube

Overview

Explore a conference talk on inference attacks against efficiently deployable and searchable encryption systems. Delve into the research presented by David Pouliot and Charles V. Wright from Portland State University at the 23rd ACM Conference on Computer and Communications Security. Learn about searchable encryption, Bloom filters, classical frequency analysis, and graph matching techniques. Examine the "Cold Currents" attack method, adjacency matrices, and experimental results. Gain insights into attack accuracy, search tags, and the impact of Bloom filter parameters on security. Understand the implications of this research for the design and implementation of secure searchable encryption systems.

Syllabus

Introduction
Searchable Encryption
Bloom Filters
Classical Frequency Analysis
Graph Matching
Cold Currents
Adjacency Matrix
Experiments
Attack Accuracy
Search Tags
Analysis
Graph
Bloom Filter Parameters
Bloom Filter Table
Experiment Results
Conclusion

Taught by

ACM CCS

Reviews

Start your review of The Shadow Nemesis - Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.