Skip to main content

Showing 1–3 of 3 results for author: Orenbach, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.07465  [pdf, other

    cs.CR cs.LG

    One for All and All for One: GNN-based Control-Flow Attestation for Embedded Devices

    Authors: Marco Chilese, Richard Mitev, Meni Orenbach, Robert Thorburn, Ahmad Atamli, Ahmad-Reza Sadeghi

    Abstract: Control-Flow Attestation (CFA) is a security service that allows an entity (verifier) to verify the integrity of code execution on a remote computer system (prover). Existing CFA schemes suffer from impractical assumptions, such as requiring access to the prover's internal state (e.g., memory or code), the complete Control-Flow Graph (CFG) of the prover's software, large sets of measurements, or t… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

  2. arXiv:2211.07185  [pdf, other

    cs.CR

    Securing Access to Untrusted Services From TEEs with GateKeeper

    Authors: Meni Orenbach, Bar Raveh, Alon Berkenstadt, Yan Michalevsky, Shachar Itzhaky, Mark Silberstein

    Abstract: Applications running in Trusted Execution Environments (TEEs) commonly use untrusted external services such as host File System. Adversaries may maliciously alter the normal service behavior to trigger subtle application bugs that would have never occurred under correct service operation, causing data leaks and integrity violations. Unfortunately, existing manual protections are incomplete and ad-… ▽ More

    Submitted 14 November, 2022; originally announced November 2022.

  3. arXiv:1511.07148  [pdf, ps, other

    cs.DC cs.IR cs.SI

    NearBucket-LSH: Efficient Similarity Search in P2P Networks

    Authors: Naama Kraus, David Carmel, Idit Keidar, Meni Orenbach

    Abstract: We present NearBucket-LSH, an effective algorithm for similarity search in large-scale distributed online social networks organized as peer-to-peer overlays. As communication is a dominant consideration in distributed systems, we focus on minimizing the network cost while guaranteeing good search quality. Our algorithm is based on Locality Sensitive Hashing (LSH), which limits the search to collec… ▽ More

    Submitted 23 November, 2015; originally announced November 2015.