Skip to content

Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage

Author: Reichert, L., Chjandran, G. R., Schoppmann, P., Schneider, T., & Scheuermann, B.
Published in: Proceedings of the 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 24)
Year: 2024
Type: Academic articles
DOI: 10.1145/3634737.3657005

Analyzing user data while protecting the privacy of individuals remains a big challenge. Trusted execution environments (TEEs) are a possible solution as they protect processes and Virtual Machines (VMs) against malicious hosts. However, TEEs can leak access patterns to code and to the data being processed. Furthermore, when data is stored in a TEE database, the data volume required to answer a query is another unwanted side channel that contains sensitive information. Both types of information leaks, access patterns and volume patterns, allow for database reconstruction attacks.

Visit publication

Publication

Connected HIIG researchers

Björn Scheuermann, Prof. Dr.

Associated Research Director


  • Open Access

Explore current HIIG Activities

Research issues in focus

HIIG is currently working on exciting topics. Learn more about our interdisciplinary pioneering work in public discourse.