Ariel Hamlin
Massachusetts Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ariel Hamlin.
Operating Systems Review | 2015
Mayank Varia; Benjamin Price; Nicholas Hwang; Ariel Hamlin; Jonathan Herzog; Jill Poland; Michael Reschly; Sophia Yakoubov; Robert K. Cunningham
This work presents the results of a three-year project that assessed nine different privacy-preserving data search systems. We detail the design of a software assessment framework that focuses on low system footprint, repeatability, and reusability. A unique achievement of this project was the automation and integration of the entire test process, from the production and execution of tests to the generation of human-readable evaluation reports. We synthesize our experiences into a set of simple mantras that we recommend following in the design of any assessment framework.
ieee symposium on security and privacy | 2017
Benjamin Fuller; Mayank Varia; Arkady Yerukhimovich; Emily Shen; Ariel Hamlin; Vijay Gadepally; Richard Shay; John Darby Mitchell; Robert K. Cunningham
Protected database search systems cryptographically isolate the roles of reading from, writing to, and administering the database. This separation limits unnecessary administrator access and protects data in the case of system breaches. Since protected search was introduced in 2000, the area has grown rapidly, systems are offered by academia, start-ups, and established companies. However, there is no best protected search system or set of techniques. Design of such systems is a balancing act between security, functionality, performance, and usability. This challenge is made more difficult by ongoing database specialization, as some users will want the functionality of SQL, NoSQL, or NewSQL databases. This database evolution will continue, and the protected search community should be able to quickly provide functionality consistent with newly invented databases. At the same time, the community must accurately and clearly characterize the tradeoffs between different approaches. To address these challenges, we provide the following contributions:1) An identification of the important primitive operations across database paradigms. We find there are a small number of base operations that can be used and combined to support a large number of database paradigms.2) An evaluation of the current state of protected search systems in implementing these base operations. This evaluation describes the main approaches and tradeoffs for each base operation. Furthermore, it puts protected search in the context of unprotected search, identifying key gaps in functionality.3) An analysis of attacks against protected search for different base queries.4) A roadmap and tools for transforming a protected search system into a protected database, including an open-source performance evaluation platform and initial user opinions of protected search.
international conference on information theoretic security | 2015
Benjamin Fuller; Ariel Hamlin
Leakage resilient cryptography designs systems to withstand partial adversary knowledge of secret state. Ideally, leakage-resilient systems withstand current and future attacks; restoring confidence in the security of implemented cryptographic systems. Understanding the relation between classes of leakage functions is an important aspect.
public key cryptography | 2018
Ariel Hamlin; Abhi Shelat; Mor Weiss; Daniel Wichs
We consider a setting where users store their encrypted documents on a remote server and can selectively share documents with each other. A user should be able to perform keyword searches over all the documents she has access to, including the ones that others shared with her. The contents of the documents, and the search queries, should remain private from the server.
ieee high performance extreme computing conference | 2014
Ariel Hamlin; Jonathan Herzog
In this paper, we describe the SPAR Test Suite Generator (STSG), a new test-suite generator for SQL style database systems. This tool produced an entire test suite (data, queries, and ground-truth answers) as a unit and in response to a users specification. Thus, database evaluators could use this tool to craft test suites for particular aspects of a specific database system. The inclusion of ground-truth answers in the produced test suite, furthermore, allowed this tool to support both benchmarking (at various scales) and correctness-checking in a repeatable way. Lastly, the test-suite generator of this document was extensively profiled and optimized, and was designed for test-time agility.
IACR Cryptology ePrint Archive | 2015
Arkady Yerukhimovich; Nabil Schear; Emily Shen; Mayank Varia; Ariel Hamlin; Sophia Yakoubov
IACR Cryptology ePrint Archive | 2018
Ariel Hamlin; Rafail Ostrovsky; Mor Weiss; Daniel Wichs
Archive | 2017
Scott I Ruoti; Ariel Hamlin; Emily Shen; Robert K. Cunningham
Archive | 2016
Ariel Hamlin; Nabil Schear; Emily Shen; Mayank Varia; Sophia Yakoubov; Arkady Yerukhimovich
Archive | 2015
Benjamin Fuller; Darby Mitchell; Robert K. Cunningham; Uri Blumenthal; Patrick T. Cable; Ariel Hamlin; Lauren Milechin; Mark Rabe; Nabil Schear; Richard Shay; Mayank Varia; Sophia Yakoubov; Arkady Yerukhimovich