Главная
Study mode:
on
1
Intro
2
Secure Computation (SC)
3
Application: Password Reuse Detection
4
Potential SC Applications
5
Memory Overhead of Secure Computation
6
Memory Can Be a Bottleneck for SC
7
Key Observation: SC Programs are Oblivious
8
SC Example: Password Reuse Detection
9
MAGE's Workflow
10
Generating a Memory Program
11
What Makes OS Virtual Memory Slow?
12
MAGE's Planner
13
Additional Challenges
14
Implementation
15
Evaluation
16
Workloads
17
Password Reuse Application
18
Conclusion
Description:
Explore a 15-minute conference talk from OSDI '21 that introduces MAGE, an execution engine for Secure Computation (SC) designed to efficiently run SC computations that exceed available memory. Learn about the challenges of memory overhead in SC, the concept of memory programming, and how MAGE leverages the oblivious nature of SC schemes to create a highly efficient virtual memory abstraction. Discover how MAGE outperforms traditional OS virtual memory systems and enables SC computations to run at nearly the same speed as if unlimited physical memory were available. Gain insights into the workflow, implementation, and evaluation of MAGE, including its application in password reuse detection and potential uses in various industries adopting SC for data privacy and security.

MAGE - Nearly Zero-Cost Virtual Memory for Secure Computation

USENIX
Add to list