Skip to main content

Showing 1–5 of 5 results for author: Tarkhani, Z

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.14202  [pdf, other

    cs.CR cs.OS

    Enabling Lightweight Privilege Separation in Applications with MicroGuards

    Authors: Zahra Tarkhani, Anil Madhavapeddy

    Abstract: Application compartmentalization and privilege separation are our primary weapons against ever-increasing security threats and privacy concerns on connected devices. Despite significant progress, it is still challenging to privilege separate inside an application address space and in multithreaded environments, particularly on resource-constrained and mobile devices. We propose MicroGuards, a ligh… ▽ More

    Submitted 25 June, 2023; originally announced June 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2004.04846

  2. arXiv:2208.10134  [pdf, other

    cs.CR cs.LG

    Machine Learning with Confidential Computing: A Systematization of Knowledge

    Authors: Fan Mo, Zahra Tarkhani, Hamed Haddadi

    Abstract: Privacy and security challenges in Machine Learning (ML) have become increasingly severe, along with ML's pervasive development and the recent demonstration of large attack surfaces. As a mature system-oriented approach, Confidential Computing has been utilized in both academia and industry to mitigate privacy and security issues in various ML scenarios. In this paper, the conjunction between ML a… ▽ More

    Submitted 3 June, 2024; v1 submitted 22 August, 2022; originally announced August 2022.

    Comments: Survey paper, 37 pages, accepted to ACM Computing Surveys

  3. arXiv:2201.07711  [pdf, other

    cs.CR cs.HC cs.LG cs.OS

    Enhancing the Security & Privacy of Wearable Brain-Computer Interfaces

    Authors: Zahra Tarkhani, Lorena Qendro, Malachy O'Connor Brown, Oscar Hill, Cecilia Mascolo, Anil Madhavapeddy

    Abstract: Brain computing interfaces (BCI) are used in a plethora of safety/privacy-critical applications, ranging from healthcare to smart communication and control. Wearable BCI setups typically involve a head-mounted sensor connected to a mobile device, combined with ML-based data processing. Consequently, they are susceptible to a multiplicity of attacks across the hardware, software, and networking sta… ▽ More

    Submitted 19 January, 2022; originally announced January 2022.

  4. arXiv:2009.01869  [pdf, other

    cs.CR cs.OS

    Enclave-Aware Compartmentalization and Secure Sharing with Sirius

    Authors: Zahra Tarkhani, Anil Madhavapeddy

    Abstract: Hardware-assisted trusted execution environments (TEEs) are critical building blocks of many modern applications. However, they have a one-way isolation model that introduces a semantic gap between a TEE and its outside world. This lack of information causes an ever-increasing set of attacks on TEE-enabled applications that exploit various insecure interactions with the host OSs, applications, or… ▽ More

    Submitted 23 November, 2020; v1 submitted 3 September, 2020; originally announced September 2020.

  5. arXiv:2004.04846  [pdf, other

    cs.OS

    $μ$Tiles: Efficient Intra-Process Privilege Enforcement of Memory Regions

    Authors: Zahra Tarkhani, Anil Madhavapeddy

    Abstract: With the alarming rate of security advisories and privacy concerns on connected devices, there is an urgent need for strong isolation guarantees in resource-constrained devices that demand very lightweight solutions. However, the status quo is that Unix-like operating systems do not offer privilege separation inside a process. Lack of practical fine-grained compartmentalization inside a shared add… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.