Skip to main content

Showing 1–3 of 3 results for author: Zinkus, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2306.05633  [pdf, other

    cs.CR

    McFIL: Model Counting Functionality-Inherent Leakage

    Authors: Maximilian Zinkus, Yinzhi Cao, Matthew Green

    Abstract: Protecting the confidentiality of private data and using it for useful collaboration have long been at odds. Modern cryptography is bridging this gap through rapid growth in secure protocols such as multi-party computation, fully-homomorphic encryption, and zero-knowledge proofs. However, even with provable indistinguishability or zero-knowledgeness, confidentiality loss from leakage inherent to t… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

    Comments: To appear in USENIX Security 2023

  2. arXiv:2109.11007  [pdf, other

    cs.CR

    SoK: Cryptographic Confidentiality of Data on Mobile Devices

    Authors: Maximilian Zinkus, Tushar M. Jois, Matthew Green

    Abstract: Mobile devices have become an indispensable component of modern life. Their high storage capacity gives these devices the capability to store vast amounts of sensitive personal data, which makes them a high-value target: these devices are routinely stolen by criminals for data theft, and are increasingly viewed by law enforcement agencies as a valuable source of forensic data. Over the past severa… ▽ More

    Submitted 22 September, 2021; originally announced September 2021.

    Comments: Proceedings on Privacy Enhancing Technologies Symposium

  3. arXiv:2105.12613  [pdf, other

    cs.CR cs.CY

    Data Security on Mobile Devices: Current State of the Art, Open Problems, and Proposed Solutions

    Authors: Maximilian Zinkus, Tushar M. Jois, Matthew Green

    Abstract: In this work we present definitive evidence, analysis, and (where needed) speculation to answer the questions, (1) Which concrete security measures in mobile devices meaningfully prevent unauthorized access to user data? (2) In what ways are modern mobile devices accessed by unauthorized parties? (3) How can we improve modern mobile devices to prevent unauthorized access? We examine the two majo… ▽ More

    Submitted 26 May, 2021; originally announced May 2021.

    Comments: Please see https://securephones.io/ for the project's website