Ghada Dessouky
Technische Universität Darmstadt
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ghada Dessouky.
computer and communications security | 2015
Daniel Demmler; Ghada Dessouky; Farinaz Koushanfar; Ahmad-Reza Sadeghi; Thomas Schneider; Shaza Zeitouni
In the recent years, secure computation has been the subject of intensive research, emerging from theory to practice. In order to make secure computation usable by non-experts, Fairplay (USENIX Security 2004) initiated a line of research in compilers that allow to automatically generate circuits from high-level descriptions of the functionality that is to be computed securely. Most recently, TinyGarble (IEEE S&P 2015) demonstrated that it is natural to use existing hardware synthesis tools for this task. In this work, we present how to use industrial-grade hardware synthesis tools to generate circuits that are not only optimized for size, but also for depth. These are required for secure computation protocols with non-constant round complexity. We compare a large variety of circuits generated by our toolchain with hand-optimized circuits and show reduction of depth by up to 14%. The main advantages of our approach are developing customized libraries of depth-optimized circuit constructions which we map to high-level functions and operators, and using existing libraries available in the industrial-grade logic synthesis tools which are heavily tested. In particular, we show how to easily obtain circuits for IEEE 754 compliant floating-point operations. We extend the open-source ABY framework (NDSS 2015) to securely evaluate circuits generated with our toolchain and show between 0.5 to 21.4 times faster floating-point operations than previous protocols of Aliasgari et al. (NDSS 2013), even though our protocols work for two parties instead of three or more. As application we consider privacy-preserving proximity testing on Earth.
design automation conference | 2016
Ebrahim M. Songhori; Shaza Zeitouni; Ghada Dessouky; Thomas Schneider; Ahmad-Reza Sadeghi; Farinaz Koushanfar
We present GarbledCPU, the first framework that realizes a hardware-based general purpose sequential processor for secure computation. Our MIPS-based implementation enables development of applications (functions) in a high-level language while performing secure function evaluation (SFE) using Yaos garbled circuit protocol in hardware. GarbledCPU provides three degrees of freedom for SFE which allow leveraging the trade-off between privacy and performance: public functions, private functions, and semi-private functions. We synthesize GarbledCPU on a Virtex-7 FPGA as a proof-of-concept implementation and evaluate it on various benchmarks including Hamming distance, private set intersection and AES. Our results indicate that our pipelined hardware framework outperforms the fastest available software implementation.
design automation conference | 2017
Ghada Dessouky; Shaza Zeitouni; Thomas Nyman; Andrew Paverd; Lucas Davi; Patrick Koeberl; N. Asokan; Ahmad-Reza Sadeghi
Attacks targeting software on embedded systems are becoming increasingly prevalent. Remote attestation is a mechanism that allows establishing trust in embedded devices. However, existing attestation schemes are either static and cannot detect control-flow attacks, or require instrumentation of software incurring high performance overheads. To overcome these limitations, we present LO-FAT, the first practical hardware-based approach to control-flow attestation. By leveraging existing processor hardware features and commonly-used IP blocks, our approach enables efficient control-flow attestation without requiring software instrumentation. We show that our proof-of-concept implementation based on a RISC-V SoC incurs no processor stalls and requires reasonable area overhead.
wireless network security | 2016
Ghada Dessouky; Ahmad-Reza Sadeghi
FPGA devices are increasingly deployed in wireless and heterogeneous networks in-field due to their re-programmable nature and high performance. Modern FPGA devices can have part of their logic partially reconfigured during runtime operation, which we propose to exploit to realize a general-purpose, flexible and reconfigurable DPA countermeasure that can be integrated into any FPGA-based system, irrespective of the cryptographic algorithm or implementation. We propose a real-time dynamic closed-loop on-chip noise generation countermeasure which consists of an on-chip power monitor coupled with a low-overhead Gaussian noise generator. The noise generator is reconfigured continuously to update its generated noise amplitude and variance so that is sufficiently hides the computation power consumption. Our scheme and its integration onto an SoC is presented as well as our proposal for evaluating its effectiveness and overhead.
network and distributed system security symposium | 2017
Ghada Dessouky; Farinaz Koushanfar; Ahmad-Reza Sadeghi; Thomas Schneider; Shaza Zeitouni; Michael Zohner
international conference on computer aided design | 2017
Shaza Zeitouni; Ghada Dessouky; Orlando Arias; Dean Sullivan; Ahmad Ibrahim; Yier Jin; Ahmad-Reza Sadeghi
arXiv: Cryptography and Security | 2017
Thomas Nyman; Ghada Dessouky; Shaza Zeitouni; Aaro Lehikoinen; Andrew J. Paverd; N. Asokan; Ahmad-Reza Sadeghi
Archive | 2018
Ghada Dessouky; Tigist Abera; Ahmad Ibrahim; Ahmad-Reza Sadeghi
IACR Cryptology ePrint Archive | 2018
Ghada Dessouky; Farinaz Koushanfar; Ahmad-Reza Sadeghi; Thomas Schneider; Shaza Zeitouni; Michael Zohner
ieee symposium on security and privacy | 2016
Ahmad-Reza Sadeghi; Ghada Dessouky