Breaking Encrypted Databases: Generic Attacks on Range Queries

preview_player
Показать описание
By Marie-Sarah Lacharite

'll start this talk with an overview of common building blocks and the latest commercial and academic solutions, focusing on those that support range queries (e.g., selecting all records where the age attribute is between 18 and 65). These techniques are tailored to specific threat models.

Рекомендации по теме
Комментарии
Автор

These are quite clever ways to reconstruct properties of the data. I especially am quite sure that I wouldn't have come up with the graph-theory approach on the second threat scenario - and much less with the super efficient way to optimize the problem.
I never considered encrypted databases (as in field-encrypted) for my stuff (not sensitive enough), but some I my friends do for their work - definitely gonna share that with them.

Fsi
Автор

That pre talk speaker sounds like an android not gonna lie

kensgold