CSIS logoCenter for Secure Information Systems

Securing the World's Cyber Infrastructure

Aerial View of the George Mason Fairfax Campus

CSIS Seminar

Demystifying Leakage in Encrypted Systems

Speaker:   Evgenios Kornaropoulos, Postdoctoral Researcher, University of California, Berkeley
When:   January 22, 2021, 11:00 am - 12:00 pm
Where:   Zoom


The growing area of encrypted systems combines cryptographic advancements with system designs so that the end product can compute directly on ciphertexts without decrypting. One of the more prominent and practical approaches is using cryptographic primitives that reveal some formally-defined information, known as leakage, during computations on encrypted data. In this talk, I present two key findings from my research that show a foundational approach to understanding leakage in practical encrypted databases. First, I present a new family of leakage-abuse attacks against various encrypted queries under realistic scenarios. Second, I use the insights from this cryptanalysis towards a new framework of principled and practical defenses with provable guarantees. Overall, these results contribute to a holistic understanding of encrypted databases, one that bridges the gap between attacks and defenses. Finally, I will talk about my long-term vision for building encrypted systems by taking a multi-angle approach that combines cryptography, algorithms, and systems. Join Zoom Meeting https://gmu.zoom.us/j/93778545608?pwd=dWh4dUZ5RzIrbjVZMUdVNEJpcW1oQT09 Meeting ID: 937 7854 5608 Passcode: 411833

Speaker Bio

Evgenios Kornaropoulos is a Postdoctoral Scholar at UC Berkeley working in the area of computer security with a focus on analysis and design of systems that use encryption. He obtained his Ph.D. from the Department of Computer Science at Brown University in 2019 where he received the Joukowsky Outstanding Dissertation Award. Before graduate school, he received his M.Sc. and B.Sc. in Computer Science at the University of Crete in Greece. He has published in conferences and journals spanning the areas of applied cryptography and security, data mining, visualization, and graph algorithms.