作者
Paul Grubbs, Marie-Sarah Lacharité, Brice Minaud, Kenneth G Paterson
发表日期
2018/10/15
图书
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
页码范围
315-331
简介
We present attacks that use only the volume of responses to range queries to reconstruct databases. Our focus is on practical attacks that work for large-scale databases with many values and records, without requiring assumptions on the data or query distributions. Our work improves on the previous state-of-the-art due to Kellaris et al. (CCS 2016) in all of these dimensions. Our main attack targets reconstruction of database counts and involves a novel graph-theoretic approach. It generally succeeds when R , the number of records, exceeds , where N is the number of possible values in the database. For a uniform query distribution, we show that it requires volume leakage from only O(N2 łog N) queries (cf. O(N4łog N) in prior work). We present two ancillary attacks. The first identifies the value of a new item added to a database using the volume leakage from fresh queries, in the setting where the adversary …
引用总数
201720182019202020212022202320241162438343923
学术搜索中的文章
P Grubbs, MS Lacharité, B Minaud, KG Paterson - Proceedings of the 2018 ACM SIGSAC Conference on …, 2018