Skip to main content

Showing 1–19 of 19 results for author: Varia, M

.
  1. arXiv:2208.06580  [pdf

    physics.optics cond-mat.mes-hall cond-mat.soft

    Photoinduced modulation of refractive index in Langmuir-Blodgett films of Azo-based H-shaped liquid crystal molecules

    Authors: Ashutosh Joshi, Akash Gayakwad, Manjuladevi V., Mahesh C. Varia, S. Kumar, R. K. Gupta

    Abstract: The development of optically active area consisting of organic molecules are essential for the devices like optical switches and waveguides, as it can be easily maneuvered by the application of suitable electromagnetic (EM) waves. In this article, we report the development of a photoactive surface by the deposition of a single layer of Langmuir-Blodgett (LB) film of a novel H-shaped liquid crystal… ▽ More

    Submitted 13 August, 2022; originally announced August 2022.

    Comments: 11 figures, 07 pages

    MSC Class: 78-05 ACM Class: J.2

    Journal ref: J. Mol. Liq. 364 (2022) 120071

  2. arXiv:2208.02905  [pdf, other

    cs.CY cs.CR

    Can the Government Compel Decryption? Don't Trust -- Verify

    Authors: Aloni Cohen, Sarah Scheffler, Mayank Varia

    Abstract: If a court knows that a respondent knows the password to a device, can the court compel the respondent to enter that password into the device? In this work, we propose a new approach to the foregone conclusion doctrine from Fisher v US that governs the answer to this question. The Holy Grail of this line of work would be a framework for reasoning about whether the testimony implicit in any action… ▽ More

    Submitted 9 September, 2022; v1 submitted 4 August, 2022; originally announced August 2022.

    Comments: 16 pages. This is the full version of a forthcoming publication in Proceedings of the 2022 Symposium on Computer Science and Law (DOI: 10.1145/3511265.3550441)

  3. arXiv:2206.01230  [pdf, ps, other

    cs.CY

    Formalizing Human Ingenuity: A Quantitative Framework for Copyright Law's Substantial Similarity

    Authors: Sarah Scheffler, Eran Tromer, Mayank Varia

    Abstract: A central notion in U.S. copyright law is judging the substantial similarity between an original and an (allegedly) derived work. Capturing this notion has proven elusive, and the many approaches offered by case law and legal scholarship are often ill-defined, contradictory, or internally-inconsistent. This work suggests that key parts of the substantial-similarity puzzle are amendable to modeli… ▽ More

    Submitted 14 June, 2022; v1 submitted 2 June, 2022; originally announced June 2022.

  4. arXiv:2204.04816  [pdf, other

    cs.CR

    Distributed Hardware Accelerated Secure Joint Computation on the COPA Framework

    Authors: Rushi Patel, Pouya Haghi, Shweta Jain, Andriy Kot, Venkata Krishnan, Mayank Varia, Martin Herbordt

    Abstract: Performance of distributed data center applications can be improved through use of FPGA-based SmartNICs, which provide additional functionality and enable higher bandwidth communication. Until lately, however, the lack of a simple approach for customizing SmartNICs to application requirements has limited the potential benefits. Intel's Configurable Network Protocol Accelerator (COPA) provides a cu… ▽ More

    Submitted 10 April, 2022; originally announced April 2022.

  5. arXiv:2102.01048  [pdf, other

    cs.DB cs.CR

    Secrecy: Secure collaborative analytics on secret-shared data

    Authors: John Liagouris, Vasiliki Kalavri, Muhammad Faisal, Mayank Varia

    Abstract: We present a relational MPC framework for secure collaborative analytics on private data with no information leakage. Our work targets challenging use cases where data owners may not have private resources to participate in the computation, thus, they need to securely outsource the data analysis to untrusted third parties. We define a set of oblivious operators, explain the secure primitives they… ▽ More

    Submitted 3 February, 2022; v1 submitted 1 February, 2021; originally announced February 2021.

  6. arXiv:2007.00826  [pdf, ps, other

    cs.CR

    Secret Sharing MPC on FPGAs in the Datacenter

    Authors: Pierre-Francois Wolfe, Rushi Patel, Robert Munafo, Mayank Varia, Martin Herbordt

    Abstract: Multi-Party Computation (MPC) is a technique enabling data from several sources to be used in a secure computation revealing only the result while protecting the original data, facilitating shared utilization of data sets gathered by different entities. The presence of Field Programmable Gate Array (FPGA) hardware in datacenters can provide accelerated computing as well as low latency, high bandwi… ▽ More

    Submitted 1 July, 2020; originally announced July 2020.

    Comments: 7 pages, 6 figures

  7. arXiv:2003.13670  [pdf, ps, other

    cs.CY cs.CR

    Anonymous Collocation Discovery: Harnessing Privacy to Tame the Coronavirus

    Authors: Ran Canetti, Ari Trachtenberg, Mayank Varia

    Abstract: Successful containment of the Coronavirus pandemic rests on the ability to quickly and reliably identify those who have been in close proximity to a contagious individual. Existing tools for doing so rely on the collection of exact location information of individuals over lengthy time periods, and combining this information with other personal information. This unprecedented encroachment on indivi… ▽ More

    Submitted 3 April, 2020; v1 submitted 30 March, 2020; originally announced March 2020.

    ACM Class: C.5.m; H.4.3; J.3; K.4.1; K.4.2

  8. arXiv:1908.07965  [pdf, other

    cs.CY

    Case Study: Disclosure of Indirect Device Fingerprinting in Privacy Policies

    Authors: Julissa Milligan, Sarah Scheffler, Andrew Sellars, Trishita Tiwari, Ari Trachtenberg, Mayank Varia

    Abstract: Recent developments in online tracking make it harder for individuals to detect and block trackers. Some sites have deployed indirect tracking methods, which attempt to uniquely identify a device by asking the browser to perform a seemingly-unrelated task. One type of indirect tracking, Canvas fingerprinting, causes the browser to render a graphic recording rendering statistics as a unique identif… ▽ More

    Submitted 21 August, 2019; originally announced August 2019.

    Comments: Appearing in STAST 2019

  9. Conclave: secure multi-party computation on big data (extended TR)

    Authors: Nikolaj Volgushev, Malte Schwarzkopf, Ben Getchell, Mayank Varia, Andrei Lapets, Azer Bestavros

    Abstract: Secure Multi-Party Computation (MPC) allows mutually distrusting parties to run joint computations without revealing private data. Current MPC algorithms scale poorly with data size, which makes MPC on "big data" prohibitively slow and inhibits its practical use. Many relational analytics queries can maintain MPC's end-to-end security guarantee without using cryptographic MPC techniques for all… ▽ More

    Submitted 17 February, 2019; originally announced February 2019.

    Comments: Extended technical report for EuroSys 2019 paper

  10. arXiv:1710.00714  [pdf, other

    cs.CR cs.DC

    Revealing the Unseen: How to Expose Cloud Usage While Protecting User Privacy

    Authors: Ata Turk, Mayank Varia, Georgios Kellaris

    Abstract: Cloud users have little visibility into the performance characteristics and utilization of the physical machines underpinning the virtualized cloud resources they use. This uncertainty forces users and researchers to reverse engineer the inner workings of cloud systems in order to understand and optimize the conditions their applications operate. At Massachusetts Open Cloud (MOC), as a public clou… ▽ More

    Submitted 2 October, 2017; originally announced October 2017.

    Comments: 6 pages, ICDM PAIS

  11. arXiv:1710.00447  [pdf, other

    cs.IT cs.LG

    Privacy with Estimation Guarantees

    Authors: Hao Wang, Lisa Vo, Flavio P. Calmon, Muriel Médard, Ken R. Duffy, Mayank Varia

    Abstract: We study the central problem in data privacy: how to share data with an analyst while providing both privacy and utility guarantees to the user that owns the data. In this setting, we present an estimation-theoretic analysis of the privacy-utility trade-off (PUT). Here, an analyst is allowed to reconstruct (in a mean-squared error sense) certain functions of the data (utility), while other private… ▽ More

    Submitted 20 March, 2020; v1 submitted 1 October, 2017; originally announced October 2017.

  12. arXiv:1704.00820  [pdf, ps, other

    cs.IT

    Principal Inertia Components and Applications

    Authors: Flavio P. Calmon, Ali Makhdoumi, Muriel Médard, Mayank Varia, Mark Christiansen, Ken R. Duffy

    Abstract: We explore properties and applications of the Principal Inertia Components (PICs) between two discrete random variables $X$ and $Y$. The PICs lie in the intersection of information and estimation theory, and provide a fine-grained decomposition of the dependence between $X$ and $Y$. Moreover, the PICs describe which functions of $X$ can or cannot be reliably inferred (in terms of MMSE) given an ob… ▽ More

    Submitted 3 April, 2017; originally announced April 2017.

    Comments: Overlaps with arXiv:1405.1472 and arXiv:1310.1512

  13. arXiv:1703.02014  [pdf, ps, other

    cs.CR

    SoK: Cryptographically Protected Database Search

    Authors: Benjamin Fuller, Mayank Varia, Arkady Yerukhimovich, Emily Shen, Ariel Hamlin, Vijay Gadepally, Richard Shay, John Darby Mitchell, Robert K. Cunningham

    Abstract: Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches. Since protected search was introduced in 2000, the area has grown rapidly; systems are offered by academia, start-ups, and established companies. However, there… ▽ More

    Submitted 2 June, 2017; v1 submitted 6 March, 2017; originally announced March 2017.

    Comments: 20 pages, to appear to IEEE Security and Privacy

  14. Parallel Vectorized Algebraic AES in MATLAB for Rapid Prototy** of Encrypted Sensor Processing Algorithms and Database Analytics

    Authors: Jeremy Kepner, Vijay Gadepally, Braden Hancock, Peter Michaleas, Elizabeth Michel, Mayank Varia

    Abstract: The increasing use of networked sensor systems and networked databases has led to an increased interest in incorporating encryption directly into sensor algorithms and database analytics. MATLAB is the dominant tool for rapid prototy** of sensor algorithms and has extensive database analytics capabilities. The advent of high level and high performance Galois Field mathematical environments allow… ▽ More

    Submitted 29 June, 2015; originally announced June 2015.

    Comments: 6 pages; accepted to IEEE High Performance Extreme Computing Conference (HPEC) 2015

  15. Computing on Masked Data to improve the Security of Big Data

    Authors: Vijay Gadepally, Braden Hancock, Benjamin Kaiser, Jeremy Kepner, Pete Michaleas, Mayank Varia, Arkady Yerukhimovich

    Abstract: Organizations that make use of large quantities of information require the ability to store and process data from central locations so that the product can be shared or distributed across a heterogeneous group of users. However, recent events underscore the need for improving the security of data stored in such untrusted servers or databases. Advances in cryptographic techniques and database techn… ▽ More

    Submitted 6 April, 2015; originally announced April 2015.

    Comments: 6 pages, Accepted to IEEE HST Conference

  16. arXiv:1503.08513  [pdf, ps, other

    cs.IT

    Hiding Symbols and Functions: New Metrics and Constructions for Information-Theoretic Security

    Authors: Flavio du Pin Calmon, Muriel Médard, Mayank Varia, Ken R. Duffy, Mark M. Christiansen, Linda M. Zeger

    Abstract: We present information-theoretic definitions and results for analyzing symmetric-key encryption schemes beyond the perfect secrecy regime, i.e. when perfect secrecy is not attained. We adopt two lines of analysis, one based on lossless source coding, and another akin to rate-distortion theory. We start by presenting a new information-theoretic metric for security, called symbol secrecy, and derive… ▽ More

    Submitted 29 March, 2015; originally announced March 2015.

    Comments: Submitted to IEEE Transactions on Information Theory

  17. arXiv:1406.5751  [pdf

    cs.CR astro-ph.IM cs.DB cs.IR

    Computing on Masked Data: a High Performance Method for Improving Big Data Veracity

    Authors: Jeremy Kepner, Vijay Gadepally, Pete Michaleas, Nabil Schear, Mayank Varia, Arkady Yerukhimovich, Robert K. Cunningham

    Abstract: The growing gap between data and users calls for innovative tools that address the challenges faced by big data volume, velocity and variety. Along with these standard three V's of big data, an emerging fourth "V" is veracity, which addresses the confidentiality, integrity, and availability of the data. Traditional cryptographic techniques that ensure the veracity of data can have overheads that a… ▽ More

    Submitted 22 June, 2014; originally announced June 2014.

    Comments: to appear in IEEE High Performance Extreme Computing 2014 (ieee-hpec.org)

  18. An Exploration of the Role of Principal Inertia Components in Information Theory

    Authors: Flavio du Pin Calmon, Mayank Varia, Muriel Médard

    Abstract: The principal inertia components of the joint distribution of two random variables $X$ and $Y$ are inherently connected to how an observation of $Y$ is statistically related to a hidden variable $X$. In this paper, we explore this connection within an information theoretic framework. We show that, under certain symmetry conditions, the principal inertia components play an important role in estimat… ▽ More

    Submitted 6 May, 2014; originally announced May 2014.

    Comments: Submitted to the 2014 IEEE Information Theory Workshop (ITW)

  19. arXiv:1310.1512  [pdf, ps, other

    cs.IT

    Bounds on inference

    Authors: Flavio du Pin Calmon, Mayank Varia, Muriel Médard, Mark M. Christiansen, Ken R. Duffy, Stefano Tessaro

    Abstract: Lower bounds for the average probability of error of estimating a hidden variable X given an observation of a correlated random variable Y, and Fano's inequality in particular, play a central role in information theory. In this paper, we present a lower bound for the average estimation error based on the marginal distribution of X and the principal inertias of the joint distribution matrix of X an… ▽ More

    Submitted 5 October, 2013; originally announced October 2013.

    Comments: Allerton 2013 with extended proof, 10 pages