Portland State University. Department of Computer Science
Date of Publication
Master of Science (M.S.) in Computer Science
Data encryption (Computer science), Software protection, Random access memory
1 online resource (iv, 103 p.) : ill.
Despite the use of strong encryption schemes, one can still learn information about encrypted data using side channel attacks . Watching what physical memory is being accessed can be such a side channel. One can hide this information by using oblivious simulation - hiding the true access pattern of a program. In this paper we will review the model behind oblivious simulation, attempt to formalize the problem and define a security game. We will review the major solutions pro- posed so far, the square root and hierarchical solutions, as well as propose a new variation on the square root solution. Additionally, we will show a new formalization for providing software protection by using an encryption scheme and oblivious simulation.
In Copyright. URI: http://rightsstatements.org/vocab/InC/1.0/ This Item is protected by copyright and/or related rights. You are free to use this Item in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s).
Chapman, Erin Elizabeth, "A Survey and Analysis of Solutions to the Oblivious Memory Access Problem" (2012). Dissertations and Theses. Paper 891.