SafeFL: MPC-friendly framework for private and robust federated learning

T Gehlhar, F Marx, T Schneider… - 2023 IEEE Security …, 2023 - ieeexplore.ieee.org
Federated learning (FL) has gained widespread popularity in a variety of industries due to its
ability to locally train models on devices while preserving privacy. However, FL systems are …

Scalable mixed-mode mpc

R Garg, K Yang, J Katz, X Wang - 2024 IEEE Symposium on …, 2024 - ieeexplore.ieee.org
Protocols for secure multi-party computation (MPC) supporting mixed-mode computation
have found a lot of applications in recent years due to their flexibility in representing the …

Bending microarchitectural weird machines towards practicality

PL Wang, R Paccagnella, RS Wahby… - 33rd USENIX Security …, 2024 - usenix.org
A large body of work has demonstrated attacks that rely on the difference between CPUs'
nominal instruction set architectures and their actual (microarchitectural) implementations …

Secure synthesis of distributed cryptographic applications (technical report)

C Acay, J Gancher, R Recto, AC Myers - arXiv preprint arXiv:2401.04131, 2024 - arxiv.org
Developing secure distributed systems is difficult, and even harder when advanced
cryptography must be used to achieve security goals. Following prior work, we advocate …

Secure synthesis of distributed cryptographic applications

C Acay, J Gancher, R Recto, AC Myers - IEEE Computer Security …, 2024 - cs.cornell.edu
Developing secure distributed systems is difficult, and even harder when advanced
cryptography must be used to achieve security goals. Following prior work, we advocate …

Combine: compilation and backend-independent vectorization for multi-party computation

B Levy, M Ishaq, B Sherman, L Kennard… - Proceedings of the …, 2023 - dl.acm.org
Recent years have witnessed significant advances in programming technology for multi-
party computation (MPC), bringing MPC closer to practice and wider applicability. Typical …

Estimating the Runtime and Global Network Traffic of SMPC Protocols

A Klinger, V Ehrmanntraut, U Meyer - Proceedings of the Fourteenth …, 2024 - dl.acm.org
Secure multi-party computation (SMPC) enables multiple parties to evaluate functions of
their private inputs, in a way such that none of the parties can learn anything about the other …

The ghost is the machine: Weird machines in transient execution

PL Wang, F Brown, RS Wahby - 2023 IEEE Security and …, 2023 - ieeexplore.ieee.org
Microarchitectural attacks typically exploit some form of transient execution to steal sensitive
data. More recently, though, a new class of attacks has used transient execution to (covertly) …

CoVault: A secure analytics platform

R De Viti, I Sheff, N Glaeser, B Dinis… - arXiv preprint arXiv …, 2022 - arxiv.org
Analytics on personal data, such as individuals' mobility, financial, and health data can be of
significant benefit to society. Such data is already collected by smartphones, apps and …

Load-Balanced Server-Aided MPC in Heterogeneous Computing

Y Lu, B Zhang, K Ren - IEEE Transactions on Information …, 2024 - ieeexplore.ieee.org
Most existing MPC protocols consider the homogeneous setting, where all the MPC players
are assumed to have identical communication and computation resources. In practice, the …