Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sebastian Angel is active.

Publication


Featured researches published by Sebastian Angel.


workshop on privacy in the electronic society | 2018

What's a Little Leakage Between Friends?

Sebastian Angel; David Lazar; Ioanna Tzialla

This paper introduces a new attack on recent messaging systems that protect communication metadata. The main observation is that if an adversary manages to compromise a users friend, it can use this compromised friend to learn information about the users other ongoing conversations. Specifically, the adversary learns whether a user is sending other messages or not, which opens the door to existing intersection and disclosure attacks. To formalize this compromised friend attack, we present an abstract scenario called the exclusive call center problem that captures the attacks root cause, and demonstrates that it is independent of the particular design or implementation of existing metadata-private messaging systems. We then introduce a new primitive called a private answering machine that can prevent the attack. Unfortunately, building a secure and efficient instance of this primitive under only computational hardness assumptions does not appear possible. Instead, we give a construction under the assumption that users can place a bound on their maximum number of friends and are okay leaking this information.


operating systems design and implementation | 2014

End-to-end performance isolation through virtual datacenters

Sebastian Angel; Hitesh Ballani; Thomas Karagiannis; Greg O'Shea; Eno Thereska


acm special interest group on data communication | 2013

Verifiable auctions for online ad exchanges

Sebastian Angel; Michael Walfish


operating systems design and implementation | 2016

Unobservable communication over fully untrusted infrastructure

Sebastian Angel; Srinath T. V. Setty


usenix security symposium | 2016

Defending against malicious peripherals with Cinch

Sebastian Angel; Riad S. Wahby; Max Howald; Joshua B. Leners; Michael Spilo; Zhen Sun; Andrew J. Blumberg; Michael Walfish


Archive | 2015

Defending against malicious peripherals

Sebastian Angel; Riad S. Wahby; Max Howald; Joshua B. Leners; Michael Spilo; Zhen Sun; Andrew J. Blumberg; Michael Walfish


ieee symposium on security and privacy | 2018

PIR with Compressed Queries and Amortized Query Processing

Sebastian Angel; Hao Chen; Kim Laine; Srinath T. V. Setty


IACR Cryptology ePrint Archive | 2017

PIR with compressed queries and amortized query processing.

Sebastian Angel; Hao Chen; Kim Laine; Srinath T. V. Setty


arXiv: Operating Systems | 2015

Harmful devices considered harmless.

Riad S. Wahby; Sebastian Angel; Max Howald; Joshua B. Leners; Andrew J. Blumberg; Michael Walfish


ieee symposium on security and privacy | 2018

Concretely efficient PIR with compressed queries and probabilistic codes

Sebastian Angel; Hao Chen; Kim Laine; Srinath T. V. Setty

Collaboration


Dive into the Sebastian Angel's collaboration.

Top Co-Authors

Avatar

Srinath T. V. Setty

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Michael Walfish

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Andrew J. Blumberg

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Joshua B. Leners

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge