May 2023
·
9 Reads
·
12 Citations
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
May 2023
·
9 Reads
·
12 Citations
January 2023
·
65 Reads
Many types of analytics on personal data can be made differentially private, thus alleviating concerns about the privacy of individuals. However, no platform currently exists that can technically prevent data leakage and misuse with minimal trust assumptions; as a result, analytics that would be in the public interest are not done in liberal societies. To bridge this gap, we present secure selective analytics (SSA), where data sources can a priori restrict the use of their data to a pre-defined set of privacy-preserving analytics queries performed by a specific group of analysts, and for a limited period. Furthermore, we show that a scalable SSA platform can be built in a strong threat model based on minimal trust. Technically, our SSA platform, CoVault, relies on a minimal trust implementation of functional encryption (FE), using a combination of secret sharing, secure multi-party computation (MPC), and trusted execution environments (TEEs). CoVault tolerates the compromise of a subset of TEE implementations as well as side channels. Despite the high cost of MPC, we show that CoVault scales to very large databases using map-reduce-based query parallelization. For example, we show that CoVault can perform queries relevant to epidemic analytics for a country of 80M using about 8000 cores, which is tolerable given the high value of such analytics.
January 2023
·
13 Reads
·
3 Citations
August 2022
·
128 Reads
·
1 Citation
In a secure analytics platform, data sources consent to the exclusive use of their data for a pre-defined set of analytics queries performed by a specific group of analysts, and for a limited period. If the platform is secure under a sufficiently strong threat model, it can provide the missing link to enabling powerful analytics of sensitive personal data, by alleviating data subjects' concerns about leakage and misuse of data. For instance, many types of powerful analytics that benefit public health, mobility, infrastructure, finance, or sustainable energy can be made differentially private, thus alleviating concerns about privacy. However, no platform currently exists that is sufficiently secure to alleviate concerns about data leakage and misuse; as a result, many types of analytics that would be in the interest of data subjects and the public are not done. CoVault uses a new multi-party implementation of functional encryption (FE) for secure analytics, which relies on a unique combination of secret sharing, multi-party secure computation (MPC), and different trusted execution environments (TEEs). CoVault is secure under a very strong threat model that tolerates compromise and side-channel attacks on any one of a small set of parties and their TEEs. Despite the cost of MPC, we show that CoVault scales to very large data sizes using map-reduce based query parallelization. For example, we show that CoVault can perform queries relevant to epidemic analytics at scale.
May 2022
·
12 Reads
Security is a core responsibility for Function-as-a-Service (FaaS) providers. The prevailing approach has each function execute in its own container to isolate concurrent executions of different functions. However, successive invocations of the same function commonly reuse the runtime state of a previous invocation in order to avoid container cold-start delays when invoking a function. Although efficient, this container reuse has security implications for functions that are invoked on behalf of differently privileged users or administrative domains: bugs in a function's implementation, third-party library, or the language runtime may leak private data from one invocation of the function to subsequent invocations of the same function. Groundhog isolates sequential invocations of a function by efficiently reverting to a clean state, free from any private data, after each invocation. The system exploits two properties of typical FaaS platforms: each container executes at most one function at a time and legitimate functions do not retain state across invocations. This enables Groundhog to efficiently snapshot and restore function state between invocations in a manner that is independent of the programming language/runtime and does not require any changes to existing functions, libraries, language runtimes, or OS kernels. We describe the design of Groundhog and its implementation in OpenWhisk, a popular production-grade open-source FaaS framework. On three existing benchmark suites, Groundhog isolates sequential invocations with modest overhead on end-to-end latency (median: 1.5%, 95p: 7%) and throughput (median: 2.5%, 95p: 49.6%), relative to an insecure baseline that reuses the container and runtime state.
April 2022
·
115 Reads
·
17 Citations
The ongoing COVID-19 pandemic let to efforts to develop and deploy digital contact tracing systems to expedite contact tracing and risk notification. Unfortunately, the success of these systems has been limited, partly owing to poor interoperability with manual contact tracing, low adoption rates, and a societally sensitive trade-off between utility and privacy. In this work, we introduce a new privacy-preserving and inclusive system for epidemic risk assessment and notification that aims to address these limitations. Rather than capturing pairwise encounters between user devices as done by existing systems, our system captures encounters between user devices and beacons placed in strategic locations where infection clusters may originate. Epidemiological simulations using an agent-based model demonstrate that, by utilizing location and environmental information and interoperating with manual contact tracing, our system can increase the accuracy of contact tracing actions and may help reduce epidemic spread already at low adoption.
June 2021
·
51 Reads
January 2021
·
93 Reads
·
2 Citations
During the ongoing COVID-19 pandemic, there have been burgeoning efforts to develop and deploy smartphone apps to expedite contact tracing and risk notification. Unfortunately, the success of these apps has been limited, partly owing to poor interoperability with manual contact tracing, low adoption rates, and a societally sensitive trade-off between utility and privacy. In this work, we introduce a new privacy-preserving and inclusive system for epidemic risk assessment and notification that aims to address the above limitations. Rather than capturing pairwise encounters between smartphones as done by existing apps, our system captures encounters between inexpensive, zero-maintenance, small devices carried by users, and beacons placed in strategic locations where infection clusters are most likely to originate. Epidemiological simulations using an agent-based model demonstrate several beneficial properties of our system. By achieving bidirectional interoperability with manual contact tracing, our system can help control disease spread already at low adoption. By utilizing the location and environmental information provided by the beacons, our system can provide significantly higher sensitivity and specificity than existing app-based systems. In addition, our simulations also suggest that it is sufficient to deploy beacons in a small fraction of strategic locations for our system to achieve high utility.
January 2021
·
53 Reads
The ongoing COVID-19 pandemic let to efforts to develop and deploy digital contact tracing systems to expedite contact tracing and risk notification. Unfortunately, the success of these systems has been limited, partly owing to poor interoperability with manual contact tracing, low adoption rates, and a societally sensitive trade-off between utility and privacy. In this work, we introduce a new privacy-preserving and inclusive system for epidemic risk assessment and notification that aims to address these limitations. Rather than capturing pairwise encounters between user devices as done by existing systems, our system captures encounters between user devices and beacons placed in strategic locations where infection clusters may originate. Epidemiological simulations using an agent-based model demonstrate that, by utilizing location and environmental information and interoperating with manual contact tracing, our system can increase the accuracy of contact tracing actions and may help reduce epidemic spread already at low adoption.
November 2020
·
161 Reads
·
1 Citation
During the ongoing COVID-19 pandemic, there have been burgeoning efforts to develop and deploy smartphone apps to expedite contact tracing and risk notification. Most of these apps track pairwise encounters between individuals via Bluetooth and then use these tracked encounters to identify and notify those who might have been in proximity of a contagious individual. Unfortunately, these apps have not yet proven sufficiently effective, partly owing to low adoption rates, but also due to the difficult tradeoff between utility and privacy and the fact that, in COVID-19, most individuals do not infect anyone but a few superspreaders infect many in superspreading events. In this paper, we proposePanCast, a privacy-preserving and inclusive system for epidemic risk assessment and notification that scales gracefully with adoption rates, utilizes location and environmental information to increase utility without tracking its users, and can be used to identify superspreading events. To this end, rather than capturing pairwise encounters between smartphones, our system utilizes Bluetooth encounters between beacons placed in strategic locations where superspreading events are most likely to occur and inexpensive, zero-maintenance, small devices that users can attach to their keyring. PanCast allows healthy individuals to use the system in a purely passive "radio" mode, and can assist and benefit from other digital and manual contact tracing systems. Finally, PanCast can be gracefully dismantled at the end of the pandemic, minimizing abuse from any malevolent government or entity.
... Sandboxes are not shared across users or functions [92]. Subsequent invocations of the same function from the same user may reuse a sandbox [19]. The platform scales the number of sandboxes per function based on invocations [7,93]. ...
May 2023
... Ideally, there would exist a solution against rollback attacks that is at once (1) general, correct for all applications, (2) automatic, requiring no application modification, and (3) resistant, allowing the application to recover as if the rollback attack did not occur. Unfortunately, despite the variety of existing solutions against rollback attacks [5,11,14,26,30,34,37,42,49,62,68,71,90,100,102], none achieve all three properties. Existing solutions either only detect but do not recover from rollbacks [11,14,26,37,49,71,90,102], are application specific [30,42,68,100], or sacrifice automation by requiring the application to use a new API [5]. ...
January 2023
... Seasonality can affect both the properties of the pathogen (mainly used in modeling seasonal influenza) and other parameters (effect of average daily temperature on susceptibility, effect of season on the contact network with sex distribution, etc.). [43,[53][54][55][56][57][58]. ...
April 2022
... Many European countries have chosen to base their official applications to limit the spread of the disease on solutions based on the beacon mechanism (cf. Barthe et al., 2021). Some solutions are focused solely on providing entertainment, such as the University of Illinois application (project no. ...
November 2020
... Some individuals and organizations have also started to experiment with introducing allegation escrows -"a neutral third-party that collects allegations anonymously, matches them against each other, and de-anonymizes allegers only after de-anonymity thresholds (in terms of number of co-allegers), pre-specified by the allegers, are reached" (Arun et al.,2018). The advantage of an allegation escrow is that it is focused on protecting individual victims of sexual harassment and operating to make reporting safer and more impactful through anonymity and strength in numbers. ...
January 2020
... Aditya et al. [71] introduce EnCore, a peer-to-peer nearby communication for opportunistic encounters using Bluetooth communication to give the user the control over her privacy. Tsai et al. [72] propose enClosure, a peer-to-peer communication based on nearby encounters for mobile devices which ensures a privacy preserving communication between users. The above mentioned works provide a privacy preserving communications between users. ...
June 2019
... In this context, Panwar et al. [33] proposed a framework to ensure trustworthy data collection from IoT devices. Shepherd et al. [10] and Tsai et al. [26] also implemented mutual attestation in device communication, with the last one allowing group communication. Wang et al. [12] addressed the IoT devices attestation in an enterprise network. ...
June 2019
... Sandstorm [50] introduced an extremely (hand-)customized network stack for supporting high performance web and Domain Name System (DNS) servers. The null-Kernel [44], like Unikraft, provides interfaces at different levels of abstraction from the hardware, and allows applications/processes to combine these different interfaces; however, they provide no implementation nor details about application compatibility. ...
May 2019
... We begin by highlighting design solutions that address issues arising from the physical side channel and the design limitations of the timing circuitry. [39] Arm Generic Timer [7] TPM Counters [86] Timeseal [5] T3E [36] Scone [10] SeCloak [54] Cryptographic Communications [25,97] Chronos [90] Semperfi et. al. [89] Table 5: Examples of representative papers that propose mitigation for timing stack issues (Ixx). ...
June 2018
... [29,76] use network embeddings but do not address rotational and flipping ambiguities, while [37] assumes that each device is capable of measuring the angle of arrival from other devices. The closest to our work are [38,70] which achieve distributed in-air acoustic localization. [70] is designed for a network with 16-40 sensors but assumes that the pair-wise distance errors are 1-5 cm, which is an order of magnitude lower than in underwater scenarios. ...
June 2018