PRESS-NEWS.org - Press Release Distribution
PRESS RELEASES DISTRIBUTION

Thwarting the cleverest attackers

Savvy hackers can steal a computer's secrets by timing its data storage transactions or measuring its power use -- new research shows how to stop them

2012-05-02
(Press-News.org) CAMBRIDGE, Mass. — In the last 10 years, cryptography researchers have demonstrated that even the most secure-seeming computer is shockingly vulnerable to attack. The time it takes a computer to store data in memory, fluctuations in its power consumption and even the noises it emits can betray information to a savvy assailant.

Attacks that use such indirect sources of information are called side-channel attacks, and the increasing popularity of cloud computing makes them an even greater threat. An attacker would have to be pretty motivated to install a device in your wall to measure your computer's power consumption. But it's comparatively easy to load a bit of code on a server in the cloud and eavesdrop on other applications it's running.

Fortunately, even as they've been researching side-channel attacks, cryptographers have also been investigating ways of stopping them. Shafi Goldwasser, the RSA Professor of Electrical Engineering and Computer Science at MIT, and her former student Guy Rothblum, who's now a researcher at Microsoft Research, recently posted a long report on the website of the Electronic Colloquium on Computational Complexity, describing a general approach to mitigating side-channel attacks. At the Association for Computing Machinery's Symposium on Theory of Computing (STOC) in May, Goldwasser and colleagues will present a paper demonstrating how the technique she developed with Rothblum can be adapted to protect information processed on web servers.

In addition to preventing attacks on private information, Goldwasser says, the technique could also protect devices that use proprietary algorithms so that they can't be reverse-engineered by pirates or market competitors — an application that she, Rothblum and others described at last year's AsiaCrypt conference.

Today, when a personal computer is in use, it's usually running multiple programs — say, a word processor, a browser, a PDF viewer, maybe an email program or a spreadsheet program. All the programs are storing data in memory, but the laptop's operating system won't let any program look at the data stored by any other. The operating systems running on servers in the cloud are no different, but a malicious program could launch a side-channel attack simply by sending its own data to memory over and over again. From the time the data storage and retrieval takes, it can infer what the other programs are doing with remarkable accuracy.

Goldwasser and Rothblum's technique obscures the computational details of a program, whether it's running on a laptop or a server. Their system converts a given computation into a sequence of smaller computational modules. Data fed into the first module is encrypted, and at no point during the module's execution is it decrypted. The still-encrypted output of the first module is fed into the second module, which encrypts it in yet a different way, and so on.

The encryption schemes and the modules are devised so that the output of the final module is exactly the output of the original computation. But the operations performed by the individual modules are entirely different. A side-channel attacker could extract information about how the data in any given module is encrypted, but that won't let him deduce what the sequence of modules do as a whole. "The adversary can take measurements of each module," Goldwasser says, "but they can't learn anything more than they could from a black box."

The report by Goldwasser and Rothblum describes a type of compiler, a program that takes code written in a form intelligible to humans and converts it into the low-level instruction intelligible to a computer. There, the computational modules are an abstraction: The instruction that inaugurates a new module looks no different from the instruction that concluded the last one. But in the STOC paper, the modules are executed on different servers on a network.

INFORMATION:

Written by: Larry Hardesty, MIT News Office

END



ELSE PRESS RELEASES FROM THIS DATE:

Interpreting the Avastin-Lucentis study for persons with macular degeneration

2012-05-02
Clarksburg, MD—This week, the second-year results of an important clinical trial on age-related macular degeneration (AMD), known as the Comparison of AMD Treatments Trials (or CATT), were published in the journal Ophthalmology. Researchers found that two drugs known as Avastin (bevacizumab) and Lucentis (ranibizumab), commonly used to treat the wet form of AMD, were similarly effective in maintaining vision. In this clinical trial funded by the National Eye Institute (NEI) of the National Institutes of Health, CATT researchers found that two years into the study, ...

Researchers find potential 'dark side' to diets high in beta-carotene

2012-05-02
COLUMBUS, Ohio - New research suggests that there could be health hazards associated with consuming excessive amounts of beta-carotene. This antioxidant is a naturally occurring pigment that gives color to foods such as carrots, sweet potatoes and certain greens. It also converts to vitamin A, and foods and supplements are the only sources for this essential nutrient. But scientists at Ohio State University have found that certain molecules that derive from beta-carotene have an opposite effect in the body: They actually block some actions of vitamin A, which is critical ...

Atlanta Family Dentist Makes Access to Practice Information Easier for Smartphone Users

2012-05-02
To further increase patients' awareness of dental health care and his practice, Dr. Donald Rozema, Atlanta family dentist, is happy to announce the launch of a mobile website for his practice. The new mobile website was created to offer smartphone and tablet users a quick, and easy way to access important information about Dr. Rozema, his practice and dental health care information. "More and more people are using smartphones and tablet devices to look up information they need. From restaurants to daily news articles, we are always on the go," said Dr. Donald ...

Woodbridge Best Pediatrician Offers Free Prenatal Consultations for Expectant Mothers

2012-05-02
Expecting parents are encouraged to visit Dr. Nimisha Shukla, Woodbridge best pediatrician, for a free prenatal consultation. With free prenatal consultations, Dr. Shukla gives expecting parents the opportunity to meet with the doctor who will be caring for their child over the next 20 years in order to establish a child's medical home. Dr. Shukla, best pediatrician in Edison, offers in-office and telephonic prenatal consultations. At the prenatal visit a mother's obstetric history, prenatal history, and ultrasound results are discussed, in addition to identifying high-risk ...

Gastroenterologist in Philadelphia Releases Mobile Website for Faster Loading Times

2012-05-02
Board certified gastroenterologists in Philadelphia, Bala Cynwyd and Langhorne, PA, G.I. Specialists, invite patients that are constantly on-the-go to visit their technologically advanced mobile website. With the recent launch of their mobile website, patients can now gain easy access to G.I. Specialists, gastroenterologists in Langhorne, without the complications of slow loading, difficult to navigate webpages. "Today, a host of people are accessing the Internet from their smartphones and tablet devices, but many websites are still stuck in the age of computer-only ...

Montreal Dentist Receives Fellowship From the Academy of General Dentistry

2012-05-02
By maintaining the highest level of continuing education standards, Dr. John Petruccelli, Montreal dentist, has received a Fellowship from the Academy of General Dentistry. With less than 2% of dentists in Canada holding this Fellowship status, Dr. Petruccelli is honored to receive this. "It is a great honor to receive a Fellowship from the Academy of General Dentistry. I look forward to continuing to maintain the highest level of continuing education, while providing my patients with quality dental care they deserve and trust," said Dr. John Petruccelli, ...

Greater numbers of highly educated women are having children, bucking recent history

2012-05-02
COLUMBUS, Ohio - A national study suggests that a significantly greater number of highly educated women in their late 30s and 40s are deciding to have children - a dramatic turnaround from recent history. Among college-educated women, childlessness peaked in the late 1990s, when about 30 percent had no children, according to the new analysis of U.S. data. But childlessness declined about 5 percentage points between 1998 and 2008. "We may be seeing the beginning of a new trend," said Bruce Weinberg, co-author of the study and professor of economics at Ohio State University. "One ...

Ajax Dentist Creates Social Network for Increased Interaction

2012-05-02
Dr. Zina Shoaib, an experienced Ajax dentist, has recently announced the launch of her practice's Facebook, Twitter, and blog. The practice's new presence on these leading social media platforms has enabled the practice to communicate with existing and prospective patients more effectively and efficiently. Patients can now read Dr. Shoaib's blog for informal dental information or become a "fan" or "friend" of the practice's Facebook, and Twitter pages for updates on office happenings. To access and join Dr. Shoaib's social network, patients can visit ...

Bigger gorillas better at attracting mates and raising young

Bigger gorillas better at attracting mates and raising young
2012-05-02
Conservationists with the Wildlife Conservation Society and the Max Planck Institute for Evolutionary Anthropology have found that larger male gorillas living in the rainforests of Congo seem to be more successful than smaller ones at attracting mates and even raising young. The study—conducted over a 12-year period in Nouabalé-Ndoki National Park in the Republic of Congo—helps to illuminate the selective pressures that influence the evolution of great apes. The study appears in a recent edition of Journal of Human Evolution. The authors of the study include: Thomas ...

Dentist in Warrenton, VA Encourages Patients to Leave Testimonials of Their Experiences

2012-05-02
To improve his practice, and further increase his patients' confidence, Dr. Jeffrey Harris, dentist in Warrenton, VA, invites patients to leave and view testimonials via his practice website. While visiting the website for Dr. Harris, patients can access the testimonial page to view positive reviews from numerous patients. Each patient has received various treatments from Dr. Harris including treatments such as Warrenton ClearCorrect, as well as veneers and dental implants in Warrenton. The testimonials show their satisfaction with the services they received in addition ...

LAST 30 PRESS RELEASES:

School-based program for newcomer students boosts mental health, research shows

Adding bridges to stabilize quantum networks

Major uncertainties remain about impact of treatment for gender related distress

Likely 50-fold rise in prevalence of gender related distress from 2011-21 in England

US college graduates live an average of 11 years longer than those who never finish high school

Scientists predict what will be top of the crops in UK by 2080 due to climate change

Study: Physical function of patients at discharge linked to hospital readmission rates

7 schools awarded financial grants to fuel student well-being

NYU Tandon research to improve emergency responses in urban areas with support from NVIDIA

Marcus Freeman named 2024 Paul “Bear” Bryant Coach of the Year

How creating and playing terrific video games can accelerate the battle against cancer

Rooting for resistance: How soybeans tackle nematode invaders is no secret anymore

Beer helps grocery stores tap sales in other categories

New USF study: Surprisingly, pulmonary fibrosis patients with COVID-19 improve

In a landmark study, an NYBG scientist and colleagues find that reforestation stands out among plant-based climate-mitigation strategies as most beneficial for wildlife biodiversity

RSClin® Tool N+ gives more accurate estimates of recurrence risk and individual chemotherapy benefit in node-positive breast cancer

Terahertz pulses induce chirality in a non-chiral crystal

AI judged to be more compassionate than expert crisis responders: Study

Scale-up fabrication of perovskite quantum dots

Adverse childhood experiences influence potentially dangerous firearm-related behavior in adulthood

Bacteria found to eat forever chemicals — and even some of their toxic byproducts

London cabbies’ planning strategies could help inform future of AI

More acidic oceans may affect the sex of oysters

Transportation insecurity in Detroit and beyond

New tool enables phylogenomic analyses of entire genomes

Uncovering the role of Y chromosome genes in male fertility in mice

A single gene underlies male mating morphs in ruff sandpipers

Presenting CASTER – a novel method for evolutionary research

Reforestation boosts biodiversity, while other land-based climate mitigation strategies fall short

Seasonal vertical migrations limit role of krill in deep-ocean carbon storage

[Press-News.org] Thwarting the cleverest attackers
Savvy hackers can steal a computer's secrets by timing its data storage transactions or measuring its power use -- new research shows how to stop them