Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ghada Dessouky is active.

Publication


Featured researches published by Ghada Dessouky.


computer and communications security | 2015

Automated Synthesis of Optimized Circuits for Secure Computation

Daniel Demmler; Ghada Dessouky; Farinaz Koushanfar; Ahmad-Reza Sadeghi; Thomas Schneider; Shaza Zeitouni

In the recent years, secure computation has been the subject of intensive research, emerging from theory to practice. In order to make secure computation usable by non-experts, Fairplay (USENIX Security 2004) initiated a line of research in compilers that allow to automatically generate circuits from high-level descriptions of the functionality that is to be computed securely. Most recently, TinyGarble (IEEE S&P 2015) demonstrated that it is natural to use existing hardware synthesis tools for this task. In this work, we present how to use industrial-grade hardware synthesis tools to generate circuits that are not only optimized for size, but also for depth. These are required for secure computation protocols with non-constant round complexity. We compare a large variety of circuits generated by our toolchain with hand-optimized circuits and show reduction of depth by up to 14%. The main advantages of our approach are developing customized libraries of depth-optimized circuit constructions which we map to high-level functions and operators, and using existing libraries available in the industrial-grade logic synthesis tools which are heavily tested. In particular, we show how to easily obtain circuits for IEEE 754 compliant floating-point operations. We extend the open-source ABY framework (NDSS 2015) to securely evaluate circuits generated with our toolchain and show between 0.5 to 21.4 times faster floating-point operations than previous protocols of Aliasgari et al. (NDSS 2013), even though our protocols work for two parties instead of three or more. As application we consider privacy-preserving proximity testing on Earth.


design automation conference | 2016

GarbledCPU: a MIPS processor for secure computation in hardware

Ebrahim M. Songhori; Shaza Zeitouni; Ghada Dessouky; Thomas Schneider; Ahmad-Reza Sadeghi; Farinaz Koushanfar

We present GarbledCPU, the first framework that realizes a hardware-based general purpose sequential processor for secure computation. Our MIPS-based implementation enables development of applications (functions) in a high-level language while performing secure function evaluation (SFE) using Yaos garbled circuit protocol in hardware. GarbledCPU provides three degrees of freedom for SFE which allow leveraging the trade-off between privacy and performance: public functions, private functions, and semi-private functions. We synthesize GarbledCPU on a Virtex-7 FPGA as a proof-of-concept implementation and evaluate it on various benchmarks including Hamming distance, private set intersection and AES. Our results indicate that our pipelined hardware framework outperforms the fastest available software implementation.


design automation conference | 2017

LO-FAT: Low-Overhead Control Flow ATtestation in Hardware

Ghada Dessouky; Shaza Zeitouni; Thomas Nyman; Andrew Paverd; Lucas Davi; Patrick Koeberl; N. Asokan; Ahmad-Reza Sadeghi

Attacks targeting software on embedded systems are becoming increasingly prevalent. Remote attestation is a mechanism that allows establishing trust in embedded devices. However, existing attestation schemes are either static and cannot detect control-flow attacks, or require instrumentation of software incurring high performance overheads. To overcome these limitations, we present LO-FAT, the first practical hardware-based approach to control-flow attestation. By leveraging existing processor hardware features and commonly-used IP blocks, our approach enables efficient control-flow attestation without requiring software instrumentation. We show that our proof-of-concept implementation based on a RISC-V SoC incurs no processor stalls and requires reasonable area overhead.


wireless network security | 2016

POSTER: Exploiting Dynamic Partial Reconfiguration for Improved Resistance Against Power Analysis Attacks on FPGAs

Ghada Dessouky; Ahmad-Reza Sadeghi

FPGA devices are increasingly deployed in wireless and heterogeneous networks in-field due to their re-programmable nature and high performance. Modern FPGA devices can have part of their logic partially reconfigured during runtime operation, which we propose to exploit to realize a general-purpose, flexible and reconfigurable DPA countermeasure that can be integrated into any FPGA-based system, irrespective of the cryptographic algorithm or implementation. We propose a real-time dynamic closed-loop on-chip noise generation countermeasure which consists of an on-chip power monitor coupled with a low-overhead Gaussian noise generator. The noise generator is reconfigured continuously to update its generated noise amplitude and variance so that is sufficiently hides the computation power consumption. Our scheme and its integration onto an SoC is presented as well as our proposal for evaluating its effectiveness and overhead.


network and distributed system security symposium | 2017

Pushing the Communication Barrier in Secure Computation using Lookup Tables

Ghada Dessouky; Farinaz Koushanfar; Ahmad-Reza Sadeghi; Thomas Schneider; Shaza Zeitouni; Michael Zohner


international conference on computer aided design | 2017

ATRIUM: runtime attestation resilient under memory attacks

Shaza Zeitouni; Ghada Dessouky; Orlando Arias; Dean Sullivan; Ahmad Ibrahim; Yier Jin; Ahmad-Reza Sadeghi


arXiv: Cryptography and Security | 2017

HardScope: Thwarting DOP with Hardware-assisted Run-time Scope Enforcement.

Thomas Nyman; Ghada Dessouky; Shaza Zeitouni; Aaro Lehikoinen; Andrew J. Paverd; N. Asokan; Ahmad-Reza Sadeghi


Archive | 2018

LiteHAX: Lightweight Hardware-Assisted Attestation of Program Execution

Ghada Dessouky; Tigist Abera; Ahmad Ibrahim; Ahmad-Reza Sadeghi


IACR Cryptology ePrint Archive | 2018

Pushing the Communication Barrier in Secure Computation using Lookup Tables.

Ghada Dessouky; Farinaz Koushanfar; Ahmad-Reza Sadeghi; Thomas Schneider; Shaza Zeitouni; Michael Zohner


ieee symposium on security and privacy | 2016

Security & Privacy Week Interviews, Part 1

Ahmad-Reza Sadeghi; Ghada Dessouky

Collaboration


Dive into the Ghada Dessouky's collaboration.

Top Co-Authors

Avatar

Ahmad-Reza Sadeghi

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Shaza Zeitouni

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Thomas Schneider

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ahmad Ibrahim

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Michael Zohner

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Daniel Demmler

Technische Universität Darmstadt

View shared research outputs
Researchain Logo
Decentralizing Knowledge