Portland State University. Department of Computer Science
Date of Award
Master of Science (M.S.) in Computer Science
1 online resource (iv, 103 p.) : ill.
Data encryption (Computer science), Software protection, Random access memory
Despite the use of strong encryption schemes, one can still learn information about encrypted data using side channel attacks . Watching what physical memory is being accessed can be such a side channel. One can hide this information by using oblivious simulation - hiding the true access pattern of a program. In this paper we will review the model behind oblivious simulation, attempt to formalize the problem and define a security game. We will review the major solutions pro- posed so far, the square root and hierarchical solutions, as well as propose a new variation on the square root solution. Additionally, we will show a new formalization for providing software protection by using an encryption scheme and oblivious simulation.
Chapman, Erin Elizabeth, "A Survey and Analysis of Solutions to the Oblivious Memory Access Problem" (2012). Dissertations and Theses. Paper 891.