Zum Inhalt springen

Menhir: An Oblivious Database with Protection against Access and Volume Pattern Leakage

Author: Reichert, L., Chjandran, G. R., Schoppmann, P., Schneider, T., & Scheuermann, B.
Published in: Proceedings of the 19th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 24)
Year: 2024
Type: Academic articles
DOI: 10.1145/3634737.3657005

Analyzing user data while protecting the privacy of individuals remains a big challenge. Trusted execution environments (TEEs) are a possible solution as they protect processes and Virtual Machines (VMs) against malicious hosts. However, TEEs can leak access patterns to code and to the data being processed. Furthermore, when data is stored in a TEE database, the data volume required to answer a query is another unwanted side channel that contains sensitive information. Both types of information leaks, access patterns and volume patterns, allow for database reconstruction attacks.

Visit publication

Publication

Connected HIIG researchers

Björn Scheuermann, Prof. Dr.

Assoziierter Forschungsdirektor

Aktuelle HIIG-Aktivitäten entdecken

Forschungsthemen im Fokus

Das HIIG beschäftigt sich mit spannenden Themen. Erfahren Sie mehr über unsere interdisziplinäre Pionierarbeit im öffentlichen Diskurs.