Presented at
Still Hacking Anyway (SHA2017),
Aug. 6, 2017, 2:30 p.m.
(60 minutes).
All those shiny cloud services sound tempting, but unfortunately they might mean giving up your private information to someone else. But with modern hardware and crypto, you can have your cake and eat it, too. How does searchable encryption work? What can oblivious RAM protect you from? Where do secure enclaves like Intel SGX shine, and where do they fail? We'll give an overview of how the latest research and products work, how experimental they are, and what they might be used for.
#DeviceSecurity #NetworkSecurity
Presenters:
-
Erica Portnoy
Erica is a Staff Technologist at EFF building Certbot, the web's https-enabling robot buddy. She earned her BSE in computer science at Princeton, where she researched oblivious computation for messaging privacy and took two different classes where she had to watch Star Trek for homework. Upon graduating, she protected authentication tokens in secure enclaves and experimented with searchable encryption. She likes dogs, the pouring rain, and being right.
Links:
Similar Presentations: