TY - GEN
T1 - A secure processor architecture for encrypted computation on untrusted programs
AU - Fletcher, Christopher
AU - Van Dijk, Marten
AU - Devadas, Srinivas
PY - 2012
Y1 - 2012
N2 - This paper considers encrypted computation where the user specifies encrypted inputs to an untrusted program, and the server computes on those encrypted inputs. To this end we propose a secure processor architecture, called Ascend, that guarantees privacy of data when arbitrary programs use the data running in a cloud-like environment (e.g., an untrusted server running an untrusted software stack). The key idea to guarantee privacy is obfuscated instruction execution; Ascend does not disclose what instruction is being run at any given time, be it an arithmetic instruction or a memory instruction. Periodic accesses to external instruction and data memory are performed through an Oblivious RAM (ORAM) interface to prevent leakage through memory access patterns. We evaluate the processor architecture on SPEC benchmarks running on encrypted data and quantify overheads.
AB - This paper considers encrypted computation where the user specifies encrypted inputs to an untrusted program, and the server computes on those encrypted inputs. To this end we propose a secure processor architecture, called Ascend, that guarantees privacy of data when arbitrary programs use the data running in a cloud-like environment (e.g., an untrusted server running an untrusted software stack). The key idea to guarantee privacy is obfuscated instruction execution; Ascend does not disclose what instruction is being run at any given time, be it an arithmetic instruction or a memory instruction. Periodic accesses to external instruction and data memory are performed through an Oblivious RAM (ORAM) interface to prevent leakage through memory access patterns. We evaluate the processor architecture on SPEC benchmarks running on encrypted data and quantify overheads.
KW - Encrypted computation
KW - Secure processors
UR - http://www.scopus.com/inward/record.url?scp=84869402047&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84869402047&partnerID=8YFLogxK
U2 - 10.1145/2382536.2382540
DO - 10.1145/2382536.2382540
M3 - Conference contribution
AN - SCOPUS:84869402047
SN - 9781450316620
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 3
EP - 8
BT - STC'12 - Proceedings of the Workshop on Scalable Trusted Computing
T2 - 7th ACM Workshop on Scalable Trusted Computing, STC 2012
Y2 - 15 October 2012 through 15 October 2012
ER -