Skip to main content

Showing 1–39 of 39 results for author: Boneh, D

.
  1. arXiv:2403.09603  [pdf, other

    cs.CR cs.AI cs.LG

    Optimistic Verifiable Training by Controlling Hardware Nondeterminism

    Authors: Megha Srivastava, Simran Arora, Dan Boneh

    Abstract: The increasing compute demands of AI systems has led to the emergence of services that train models on behalf of clients lacking necessary resources. However, ensuring correctness of training and guarding against potential training-time attacks, such as data poisoning, poses challenges. Existing works on verifiable training largely fall into two classes: proof-based systems, which struggle to scal… ▽ More

    Submitted 16 March, 2024; v1 submitted 14 March, 2024; originally announced March 2024.

    Comments: 11 pages, 5 figures, preprint

  2. arXiv:2402.12572  [pdf, other

    cs.LG cs.AI cs.CR

    FairProof : Confidential and Certifiable Fairness for Neural Networks

    Authors: Chhavi Yadav, Amrita Roy Chowdhury, Dan Boneh, Kamalika Chaudhuri

    Abstract: Machine learning models are increasingly used in societal applications, yet legal and privacy concerns demand that they very often be kept confidential. Consequently, there is a growing distrust about the fairness properties of these models in the minds of consumers, who are often at the receiving end of model predictions. To this end, we propose FairProof - a system that uses Zero-Knowledge Proof… ▽ More

    Submitted 19 February, 2024; originally announced February 2024.

  3. arXiv:2312.14375  [pdf, ps, other

    cs.CR

    R-Pool and Settlement Markets for Recoverable ERC-20R Tokens

    Authors: Kaili Wang, Qinchen Wang, Calvin Cai, Dan Boneh

    Abstract: ERC-20R is a wrapper around ERC-20 that supports asset recovery within a limited time window after an asset is transferred. It is designed to reduce theft and losses on the blockchain by allowing a victim to recover their stolen or lost assets during the recovery window. When an honest recipient receives an ERC-20R asset, they must wait until the recovery windows elapses (say, 24 hours), before th… ▽ More

    Submitted 21 December, 2023; originally announced December 2023.

    Comments: in 2023 ACM Workshop on Decentralized Finance and Security (ACM DeFi 2023)

  4. arXiv:2310.19201  [pdf, ps, other

    cs.CY

    Open Problems in DAOs

    Authors: Joshua Tan, Tara Merk, Sarah Hubbard, Eliza R. Oak, Helena Rong, Joni Pirovich, Ellie Rennie, Rolf Hoefer, Michael Zargham, Jason Potts, Chris Berg, Reuben Youngblom, Primavera De Filippi, Seth Frey, Jeff Strnad, Morshed Mannan, Kelsie Nabben, Silke Noa Elrifai, Jake Hartnell, Benjamin Mako Hill, Tobin South, Ryan L. Thomas, Jonathan Dotan, Ariana Spring, Alexia Maddox , et al. (4 additional authors not shown)

    Abstract: Decentralized autonomous organizations (DAOs) are a new, rapidly-growing class of organizations governed by smart contracts. Here we describe how researchers can contribute to the emerging science of DAOs and other digitally-constituted organizations. From granular privacy primitives to mechanism designs to model laws, we identify high-impact problems in the DAO ecosystem where existing gaps might… ▽ More

    Submitted 12 June, 2024; v1 submitted 29 October, 2023; originally announced October 2023.

    Comments: includes major coordination problems

  5. arXiv:2307.04085  [pdf, other

    cs.CR

    Vector Commitments with Efficient Updates

    Authors: Ertem Nusret Tas, Dan Boneh

    Abstract: Dynamic vector commitments that enable local updates of opening proofs have applications ranging from verifiable databases with membership changes to stateless clients on blockchains. In these applications, each user maintains a relevant subset of the committed messages and the corresponding opening proofs with the goal of ensuring a succinct global state. When the messages are updated, users are… ▽ More

    Submitted 4 May, 2024; v1 submitted 8 July, 2023; originally announced July 2023.

    Comments: In Advances in Financial Technologies - AFT 2023

  6. Do Users Write More Insecure Code with AI Assistants?

    Authors: Neil Perry, Megha Srivastava, Deepak Kumar, Dan Boneh

    Abstract: We conduct the first large-scale user study examining how users interact with an AI Code assistant to solve a variety of security related tasks across different programming languages. Overall, we find that participants who had access to an AI assistant based on OpenAI's codex-davinci-002 model wrote significantly less secure code than those without access. Additionally, participants with access to… ▽ More

    Submitted 18 December, 2023; v1 submitted 7 November, 2022; originally announced November 2022.

    Comments: 16 pages, 16 figures, update adds names of statistical tests and survey questions, full version of conference paper

    Journal ref: CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, November 2023, Pages 2785-2799

  7. arXiv:2210.00264  [pdf, other

    cs.CR

    zkBridge: Trustless Cross-chain Bridges Made Practical

    Authors: Tiancheng Xie, Jiaheng Zhang, Zerui Cheng, Fan Zhang, Yupeng Zhang, Yongzheng Jia, Dan Boneh, Dawn Song

    Abstract: Blockchains have seen growing traction with cryptocurrencies reaching a market cap of over 1 trillion dollars, major institution investors taking interests, and global impacts on governments, businesses, and individuals. Also growing significantly is the heterogeneity of the ecosystem where a variety of blockchains co-exist. Cross-chain bridge is a necessary building block in this multi-chain ecos… ▽ More

    Submitted 1 October, 2022; originally announced October 2022.

    Comments: An extended version of the paper to appear in ACM CCS 2022

  8. arXiv:2209.00307  [pdf, other

    cs.CR

    Memory Tagging: A Memory Efficient Design

    Authors: Aditi Partap, Dan Boneh

    Abstract: ARM recently introduced a security feature called Memory Tagging Extension or MTE, which is designed to defend against common memory safety vulnerabilities, such as buffer overflow and use after free. In this paper, we examine three aspects of MTE. First, we survey how modern software systems, such as Glibc, Android, Chrome, Linux, and LLVM, use MTE. We identify some common weaknesses and propose… ▽ More

    Submitted 3 November, 2022; v1 submitted 1 September, 2022; originally announced September 2022.

    Comments: 16 Pages, 7 Figures. This version of the paper extends a shorter version submitted to IEEE Euro S&P'23

  9. arXiv:2208.02999  [pdf, other

    cs.CR

    Cryptoeconomic Security for Data Availability Committees

    Authors: Ertem Nusret Tas, Dan Boneh

    Abstract: Layer 2 systems have received increasing attention due to their potential to scale the throughput of L1 blockchains. To avoid the cost of putting data on chain, these systems increasingly turn to off-chain data availability solutions such as data availability committees (DACs). However, placing trust on DACs conflicts with the goal of obtaining an L2 architecture whose security relies solely on th… ▽ More

    Submitted 19 June, 2023; v1 submitted 5 August, 2022; originally announced August 2022.

    Comments: In Financial Cryptography and Data Security 2023

  10. arXiv:2208.00543  [pdf, other

    cs.CR

    ERC-20R and ERC-721R: Reversible Transactions on Ethereum

    Authors: Kaili Wang, Qinchen Wang, Dan Boneh

    Abstract: Blockchains are meant to be persistent: posted transactions are immutable and cannot be changed. When a theft takes place, there are limited options for reversing the disputed transaction, and this has led to significant losses in the blockchain ecosystem. In this paper we propose reversible versions of ERC-20 and ERC-721, the most widely used token standards. With these new standards, a transac… ▽ More

    Submitted 9 October, 2022; v1 submitted 31 July, 2022; originally announced August 2022.

  11. arXiv:2207.04145  [pdf, other

    cs.CR

    Strong Anonymity for Mesh Messaging

    Authors: Neil Perry, Bruce Spang, Saba Eskandarian, Dan Boneh

    Abstract: Messaging systems built on mesh networks consisting of smartphones communicating over Bluetooth have been used by protesters around the world after governments have disrupted Internet connectivity. Unfortunately, existing systems have been shown to be insecure; most concerningly by not adequately hiding metadata. This is further complicated by the fact that wireless communication such as Bluetooth… ▽ More

    Submitted 22 August, 2022; v1 submitted 8 July, 2022; originally announced July 2022.

    Comments: 21 pages, 11 figures; added reference to introduction

  12. Attacks on Onion Discovery and Remedies via Self-Authenticating Traditional Addresses

    Authors: Paul Syverson, Matthew Finkel, Saba Eskandarian, Dan Boneh

    Abstract: Onion addresses encode their own public key. They are thus self-authenticating, one of the security and privacy advantages of onion services, which are typically accessed via Tor Browser. Because of the mostly random-looking appearance of onion addresses, a number of onion discovery mechanisms have been created to permit routing to an onion address associated with a more meaningful URL, such as a… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

    Comments: To appear in the ACM Workshop on Privacy in the Electronic Society (WPES '21)

  13. arXiv:2012.14884  [pdf, other

    cs.CR

    Lightweight Techniques for Private Heavy Hitters

    Authors: Dan Boneh, Elette Boyle, Henry Corrigan-Gibbs, Niv Gilboa, Yuval Ishai

    Abstract: This paper presents Poplar, a new system for solving the private heavy-hitters problem. In this problem, there are many clients and a small set of data-collection servers. Each client holds a private bitstring. The servers want to recover the set of all popular strings, without learning anything else about any client's string. A web-browser vendor, for instance, can use Poplar to figure out which… ▽ More

    Submitted 23 March, 2023; v1 submitted 29 December, 2020; originally announced December 2020.

    Comments: Appeared at IEEE Security & Privacy 2021

  14. arXiv:2011.11660  [pdf, other

    cs.LG cs.CR stat.ML

    Differentially Private Learning Needs Better Features (or Much More Data)

    Authors: Florian Tramèr, Dan Boneh

    Abstract: We demonstrate that differentially private machine learning has not yet reached its "AlexNet moment" on many canonical vision tasks: linear models trained on handcrafted features significantly outperform end-to-end deep neural networks for moderate privacy budgets. To exceed the performance of handcrafted features, we show that private learning requires either much more private data, or access to… ▽ More

    Submitted 17 February, 2021; v1 submitted 23 November, 2020; originally announced November 2020.

    Comments: ICLR 2021. Code available at https://github.com/ftramer/Handcrafted-DP

  15. arXiv:1911.09215  [pdf, other

    cs.CR

    Express: Lowering the Cost of Metadata-hiding Communication with Cryptographic Privacy

    Authors: Saba Eskandarian, Henry Corrigan-Gibbs, Matei Zaharia, Dan Boneh

    Abstract: Existing systems for metadata-hiding messaging that provide cryptographic privacy properties have either high communication costs, high computation costs, or both. In this paper, we introduce Express, a metadata-hiding communication system that significantly reduces both communication and computation costs. Express is a two-server system that provides cryptographic security against an arbitrary nu… ▽ More

    Submitted 24 September, 2020; v1 submitted 20 November, 2019; originally announced November 2019.

  16. arXiv:1910.03180  [pdf, other

    math.NT cs.CR

    Supersingular Curves With Small Non-integer Endomorphisms

    Authors: Jonathan Love, Dan Boneh

    Abstract: We introduce a special class of supersingular curves over $\mathbb{F}_{p^2}$, characterized by the existence of non-integer endomorphisms of small degree. A number of properties of this set is proved. Most notably, we show that when this set partitions into subsets in such a way that curves within each subset have small-degree isogenies between them, but curves in distinct subsets have no small-de… ▽ More

    Submitted 23 June, 2020; v1 submitted 7 October, 2019; originally announced October 2019.

    Comments: 25 pages, 2 figures; improved bound for Theorem 1.3 (from an improvement to the proof of Proposition 4.5); new Appendix C on l-isogenies that can't be replaced by short coprime-to-l-isogenies; moved discussion of algorithms to an appendix; new, more direct (local) proofs of Lemmas 4.2 and 5.4; many minor revisions

  17. arXiv:1909.00056  [pdf, ps, other

    cs.CY cs.CR stat.ML

    How Relevant is the Turing Test in the Age of Sophisbots?

    Authors: Dan Boneh, Andrew J. Grotto, Patrick McDaniel, Nicolas Papernot

    Abstract: Popular culture has contemplated societies of thinking machines for generations, envisioning futures from utopian to dystopian. These futures are, arguably, here now-we find ourselves at the doorstep of technology that can at least simulate the appearance of thinking, acting, and feeling. The real question is: now what?

    Submitted 30 August, 2019; originally announced September 2019.

  18. arXiv:1908.03999  [pdf, other

    cs.CR cs.LO econ.TH

    Retrofitting a two-way peg between blockchains

    Authors: Jason Teutsch, Michael Straka, Dan Boneh

    Abstract: In December 2015, a bounty emerged to establish both reliable communication and secure transfer of value between the Dogecoin and Ethereum blockchains. This prized "Dogethereum bridge" would allow parties to "lock" a DOGE coin on Dogecoin and in exchange receive a newly minted WOW token in Ethereum. Any subsequent owner of the WOW token could burn it and, in exchange, earn the right to "unlock" a… ▽ More

    Submitted 12 August, 2019; originally announced August 2019.

    MSC Class: 94A62; 91B44; 68M14

  19. arXiv:1904.13000  [pdf, ps, other

    cs.LG cs.CR stat.ML

    Adversarial Training and Robustness for Multiple Perturbations

    Authors: Florian Tramèr, Dan Boneh

    Abstract: Defenses against adversarial examples, such as adversarial training, are typically tailored to a single perturbation type (e.g., small $\ell_\infty$-noise). For other perturbations, these defenses offer no guarantees and, at times, even increase the model's vulnerability. Our aim is to understand the reasons underlying this robustness trade-off, and to train models that are simultaneously robust t… ▽ More

    Submitted 17 October, 2019; v1 submitted 29 April, 2019; originally announced April 2019.

    Comments: Accepted at NeurIPS 2019, 23 pages

  20. arXiv:1811.03194  [pdf, other

    cs.CR cs.LG stat.ML

    AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning

    Authors: Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh

    Abstract: Perceptual ad-blocking is a novel approach that detects online advertisements based on their visual content. Compared to traditional filter lists, the use of perceptual signals is believed to be less prone to an arms race with web publishers and ad networks. We demonstrate that this may not be the case. We describe attacks on multiple perceptual ad-blocking techniques, and unveil a new arms race t… ▽ More

    Submitted 26 August, 2019; v1 submitted 7 November, 2018; originally announced November 2018.

    Comments: 17 pages, 14 figures

    Journal ref: In 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS '19)

  21. arXiv:1810.04660  [pdf, other

    cs.CR

    True2F: Backdoor-resistant authentication tokens

    Authors: Emma Dauterman, Henry Corrigan-Gibbs, David Mazières, Dan Boneh, Dominic Rizzo

    Abstract: We present True2F, a system for second-factor authentication that provides the benefits of conventional authentication tokens in the face of phishing and software compromise, while also providing strong protection against token faults and backdoors. To do so, we develop new lightweight two-party protocols for generating cryptographic keys and ECDSA signatures, and we implement new privacy defenses… ▽ More

    Submitted 11 August, 2019; v1 submitted 10 October, 2018; originally announced October 2018.

  22. arXiv:1809.04774  [pdf, other

    cs.CR

    Fidelius: Protecting User Secrets from Compromised Browsers

    Authors: Saba Eskandarian, Jonathan Cogan, Sawyer Birnbaum, Peh Chang Wei Brandon, Dillon Franke, Forest Fraser, Gaspar Garcia Jr., Eric Gong, Hung T. Nguyen, Taresh K. Sethi, Vishal Subbiah, Michael Backes, Giancarlo Pellegrino, Dan Boneh

    Abstract: Users regularly enter sensitive data, such as passwords, credit card numbers, or tax information, into the browser window. While modern browsers provide powerful client-side privacy measures to protect this data, none of these defenses prevent a browser compromised by malware from stealing it. In this work, we present Fidelius, a new architecture that uses trusted hardware enclaves integrated into… ▽ More

    Submitted 3 December, 2018; v1 submitted 13 September, 2018; originally announced September 2018.

  23. arXiv:1807.03038  [pdf, ps, other

    cs.CR math.AG math.NT

    Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves

    Authors: Dan Boneh, Darren Glass, Daniel Krashen, Kristin Lauter, Shahed Sharif, Alice Silverberg, Mehdi Tibouchi, Mark Zhandry

    Abstract: We describe a framework for constructing an efficient non-interactive key exchange (NIKE) protocol for n parties for any n >= 2. Our approach is based on the problem of computing isogenies between isogenous elliptic curves, which is believed to be difficult. We do not obtain a working protocol because of a missing step that is currently an open mathematical problem. What we need to complete our pr… ▽ More

    Submitted 31 August, 2018; v1 submitted 9 July, 2018; originally announced July 2018.

    MSC Class: 14K02 (Primary) 14Q20; 11Y16; 94A60 (Secondary)

  24. arXiv:1806.03287  [pdf, other

    stat.ML cs.CR cs.LG

    Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware

    Authors: Florian Tramèr, Dan Boneh

    Abstract: As Machine Learning (ML) gets applied to security-critical or sensitive domains, there is a growing need for integrity and privacy for outsourced ML computations. A pragmatic solution comes from Trusted Execution Environments (TEEs), which use hardware and software protections to isolate sensitive computations from the untrusted software stack. However, these isolation guarantees come at a price i… ▽ More

    Submitted 27 February, 2019; v1 submitted 8 June, 2018; originally announced June 2018.

    Comments: Accepted as an oral presentation at ICLR 2019. OpenReview available at https://openreview.net/forum?id=rJVorjCcKQ

  25. arXiv:1708.08424  [pdf, other

    cs.CR

    T/Key: Second-Factor Authentication From Secure Hash Chains

    Authors: Dmitry Kogan, Nathan Manohar, Dan Boneh

    Abstract: Time-based one-time password (TOTP) systems in use today require storing secrets on both the client and the server. As a result, an attack on the server can expose all second factors for all users in the system. We present T/Key, a time-based one-time password system that requires no secrets on the server. Our work modernizes the classic S/Key system and addresses the challenges in making such a s… ▽ More

    Submitted 28 August, 2017; originally announced August 2017.

    Comments: Accepted to ACM CCS 2017

  26. arXiv:1705.07204  [pdf, other

    stat.ML cs.CR cs.LG

    Ensemble Adversarial Training: Attacks and Defenses

    Authors: Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel

    Abstract: Adversarial examples are perturbed inputs designed to fool machine learning models. Adversarial training injects such examples into training data to increase robustness. To scale this technique to large datasets, perturbations are crafted using fast single-step methods that maximize a linear approximation of the model's loss. We show that this form of adversarial training converges to a degenerate… ▽ More

    Submitted 26 April, 2020; v1 submitted 19 May, 2017; originally announced May 2017.

    Comments: 22 pages, 5 figures, International Conference on Learning Representations (ICLR) 2018 (amended in April 2020 to include subsequent attacks that significantly reduced the robustness of our models)

  27. arXiv:1704.03453  [pdf, other

    stat.ML cs.CR cs.LG

    The Space of Transferable Adversarial Examples

    Authors: Florian Tramèr, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel

    Abstract: Adversarial examples are maliciously perturbed inputs designed to mislead machine learning (ML) models at test-time. They often transfer: the same adversarial example fools more than one model. In this work, we propose novel methods for estimating the previously unknown dimensionality of the space of adversarial inputs. We find that adversarial examples span a contiguous subspace of large (~25)… ▽ More

    Submitted 23 May, 2017; v1 submitted 11 April, 2017; originally announced April 2017.

    Comments: 15 pages, 7 figures

  28. arXiv:1703.06255  [pdf, other

    cs.CR

    Prio: Private, Robust, and Scalable Computation of Aggregate Statistics

    Authors: Henry Corrigan-Gibbs, Dan Boneh

    Abstract: This paper presents Prio, a privacy-preserving system for the collection of aggregate statistics. Each Prio client holds a private data value (e.g., its current location), and a small set of servers compute statistical functions over the values of all clients (e.g., the most popular location). As long as at least one server is honest, the Prio servers learn nearly nothing about the clients' privat… ▽ More

    Submitted 18 March, 2017; originally announced March 2017.

    Comments: Extended version of NSDI 2017 paper by the same name

  29. arXiv:1703.02209  [pdf, ps, other

    cs.CR

    Certificate Transparency with Privacy

    Authors: Saba Eskandarian, Eran Messeri, Joseph Bonneau, Dan Boneh

    Abstract: Certificate transparency (CT) is an elegant mechanism designed to detect when a certificate authority (CA) has issued a certificate incorrectly. Many CAs now support CT and it is being actively deployed in browsers. However, a number of privacy-related challenges remain. In this paper we propose practical solutions to two issues. First, we develop a mechanism that enables web browsers to audit a C… ▽ More

    Submitted 7 August, 2017; v1 submitted 6 March, 2017; originally announced March 2017.

  30. arXiv:1604.06959  [pdf, ps, other

    cs.CR

    Privacy, Discovery, and Authentication for the Internet of Things

    Authors: David J. Wu, Ankur Taly, Asim Shankar, Dan Boneh

    Abstract: Automatic service discovery is essential to realizing the full potential of the Internet of Things (IoT). While discovery protocols like Multicast DNS, Apple AirDrop, and Bluetooth Low Energy have gained widespread adoption across both IoT and mobile devices, most of these protocols do not offer any form of privacy control for the service, and often leak sensitive information such as service type,… ▽ More

    Submitted 28 February, 2017; v1 submitted 23 April, 2016; originally announced April 2016.

    Comments: Extended version of ESORICS 2016 paper

  31. arXiv:1506.04110  [pdf

    cs.CR

    Stickler: Defending Against Malicious CDNs in an Unmodified Browser

    Authors: Amit Levy, Henry Corrigan-Gibbs, Dan Boneh

    Abstract: Website publishers can derive enormous performance benefits and cost savings by directing traffic to their sites through content distribution networks (CDNs). However, publishers who use CDNs today must trust their CDN not to modify the site's JavaScript, CSS, images or other media en route to end users. A CDN that violates this trust could inject ads into websites, downsample media to save bandwi… ▽ More

    Submitted 12 June, 2015; originally announced June 2015.

    Comments: In Proceedings of the 9th Workshop on Web 2.0 Security and Privacy (W2SP) 2015

  32. arXiv:1506.00189  [pdf, other

    cs.CR

    Robust and Efficient Elimination of Cache and Timing Side Channels

    Authors: Benjamin A. Braun, Suman Jana, Dan Boneh

    Abstract: Timing and cache side channels provide powerful attacks against many sensitive operations including cryptographic implementations. Existing defenses cannot protect against all classes of such attacks without incurring prohibitive performance overhead. A popular strategy for defending against all classes of these attacks is to modify the implementation so that the timing and cache access patterns o… ▽ More

    Submitted 31 August, 2015; v1 submitted 30 May, 2015; originally announced June 2015.

    Comments: 15 pages, 10 figures, submitted to NDSS 2016

  33. Riposte: An Anonymous Messaging System Handling Millions of Users

    Authors: Henry Corrigan-Gibbs, Dan Boneh, David Mazières

    Abstract: This paper presents Riposte, a new system for anonymous broadcast messaging. Riposte is the first such system, to our knowledge, that simultaneously protects against traffic-analysis attacks, prevents anonymous denial-of-service by malicious clients, and scales to million-user anonymity sets. To achieve these properties, Riposte makes novel use of techniques used in systems for private information… ▽ More

    Submitted 24 June, 2021; v1 submitted 20 March, 2015; originally announced March 2015.

    Comments: This is an extended and corrected version of a paper published at the IEEE Symposium on Security and Privacy 2015 ("Oakland 2015")

  34. arXiv:1502.03182  [pdf, other

    cs.CR

    PowerSpy: Location Tracking using Mobile Device Power Analysis

    Authors: Yan Michalevsky, Gabi Nakibly, Aaron Schulman, Gunaa Arumugam Veerapandian, Dan Boneh

    Abstract: Modern mobile platforms like Android enable applications to read aggregate power usage on the phone. This information is considered harmless and reading it requires no user permission or notification. We show that by simply reading the phone's aggregate power consumption over a period of a few minutes an application can learn information about the user's location. Aggregate phone power consumption… ▽ More

    Submitted 17 August, 2015; v1 submitted 10 February, 2015; originally announced February 2015.

    Comments: Usenix Security 2015

  35. arXiv:1408.1451  [pdf, other

    cs.CR cs.PL

    Cryptographically Enforced Control Flow Integrity

    Authors: Ali Jose Mashtizadeh, Andrea Bittau, David Mazieres, Dan Boneh

    Abstract: Recent Pwn2Own competitions have demonstrated the continued effectiveness of control hijacking attacks despite deployed countermeasures including stack canaries and ASLR. A powerful defense called Control flow Integrity (CFI) offers a principled approach to preventing such attacks. However, prior CFI implementations use static analysis and must limit protection to remain practical. These limitatio… ▽ More

    Submitted 6 August, 2014; originally announced August 2014.

  36. arXiv:1408.1416  [pdf, other

    cs.CR

    Mobile Device Identification via Sensor Fingerprinting

    Authors: Hristo Bo**ov, Yan Michalevsky, Gabi Nakibly, Dan Boneh

    Abstract: We demonstrate how the multitude of sensors on a smartphone can be used to construct a reliable hardware fingerprint of the phone. Such a fingerprint can be used to de-anonymize mobile devices as they connect to web sites, and as a second factor in identifying legitimate users to a remote server. We present two implementations: one based on analyzing the frequency response of the speakerphone-micr… ▽ More

    Submitted 6 August, 2014; originally announced August 2014.

  37. arXiv:1309.7366  [pdf, ps, other

    cs.CR

    Ensuring High-Quality Randomness in Cryptographic Key Generation

    Authors: Henry Corrigan-Gibbs, Wendy Mu, Dan Boneh, Bryan Ford

    Abstract: The security of any cryptosystem relies on the secrecy of the system's secret keys. Yet, recent experimental work demonstrates that tens of thousands of devices on the Internet use RSA and DSA secrets drawn from a small pool of candidate values. As a result, an adversary can derive the device's secret keys without breaking the underlying cryptosystem. We introduce a new threat model, under which t… ▽ More

    Submitted 8 January, 2014; v1 submitted 27 September, 2013; originally announced September 2013.

    Comments: This is an extended and corrected version of a paper which appeared in the proceedings of the 2013 ACM Conference on Computer and Communications Security (CCS). This version corrects an error in the proceedings version of the DSA protocol and accompanying security proof. This version also contains the full proof of security for the RSA protocol

    ACM Class: C.2.0; C.2.2; E.3

  38. arXiv:1202.4503  [pdf, ps, other

    cs.CY

    A Critical Look at Decentralized Personal Data Architectures

    Authors: Arvind Narayanan, Vincent Toubiana, Solon Barocas, Helen Nissenbaum, Dan Boneh

    Abstract: While the Internet was conceived as a decentralized network, the most widely used web applications today tend toward centralization. Control increasingly rests with centralized service providers who, as a consequence, have also amassed unprecedented amounts of data about the behaviors and personalities of individuals. Developers, regulators, and consumer advocates have looked to alternative dece… ▽ More

    Submitted 20 February, 2012; originally announced February 2012.

  39. Random Oracles in a Quantum World

    Authors: Dan Boneh, Özgür Dagdelen, Marc Fischlin, Anja Lehmann, Christian Schaffner, Mark Zhandry

    Abstract: The interest in post-quantum cryptography - classical systems that remain secure in the presence of a quantum adversary - has generated elegant proposals for new cryptosystems. Some of these systems are set in the random oracle model and are proven secure relative to adversaries that have classical access to the random oracle. We argue that to prove post-quantum security one needs to prove securit… ▽ More

    Submitted 20 January, 2012; v1 submitted 5 August, 2010; originally announced August 2010.

    Comments: 38 pages, v2: many substantial changes and extensions, merged with a related paper by Boneh and Zhandry

    Journal ref: full version of Advances in Cryptology - ASIACRYPT 2011, pages 41-69, 2011