Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shaza Zeitouni is active.

Publication


Featured researches published by Shaza Zeitouni.


computer and communications security | 2015

Automated Synthesis of Optimized Circuits for Secure Computation

Daniel Demmler; Ghada Dessouky; Farinaz Koushanfar; Ahmad-Reza Sadeghi; Thomas Schneider; Shaza Zeitouni

In the recent years, secure computation has been the subject of intensive research, emerging from theory to practice. In order to make secure computation usable by non-experts, Fairplay (USENIX Security 2004) initiated a line of research in compilers that allow to automatically generate circuits from high-level descriptions of the functionality that is to be computed securely. Most recently, TinyGarble (IEEE S&P 2015) demonstrated that it is natural to use existing hardware synthesis tools for this task. In this work, we present how to use industrial-grade hardware synthesis tools to generate circuits that are not only optimized for size, but also for depth. These are required for secure computation protocols with non-constant round complexity. We compare a large variety of circuits generated by our toolchain with hand-optimized circuits and show reduction of depth by up to 14%. The main advantages of our approach are developing customized libraries of depth-optimized circuit constructions which we map to high-level functions and operators, and using existing libraries available in the industrial-grade logic synthesis tools which are heavily tested. In particular, we show how to easily obtain circuits for IEEE 754 compliant floating-point operations. We extend the open-source ABY framework (NDSS 2015) to securely evaluate circuits generated with our toolchain and show between 0.5 to 21.4 times faster floating-point operations than previous protocols of Aliasgari et al. (NDSS 2013), even though our protocols work for two parties instead of three or more. As application we consider privacy-preserving proximity testing on Earth.


IEEE Transactions on Information Forensics and Security | 2016

Remanence Decay Side-Channel: The PUF Case

Shaza Zeitouni; Yossef Oren; Christian Wachsmann; Patrick Koeberl; Ahmad-Reza Sadeghi

We present a side-channel attack based on remanence decay in volatile memory and show how it can be exploited effectively to launch a noninvasive cloning attack against SRAM physically unclonable functions (PUFs) - an important class of PUFs typically proposed as lightweight security primitives, which use existing memory on the underlying device. We validate our approach using SRAM PUFs instantiated on two 65-nm CMOS devices. We discuss countermeasures against our attack and propose the constructive use of remanence decay to improve the cloning resistance of SRAM PUFs. Moreover, as a further contribution of independent interest, we show how to use our evaluation results to significantly improve the performance of the recently proposed TARDIS scheme, which is based on remanence decay in SRAM memory and used as a time-keeping mechanism for low-power clockless devices.


design automation conference | 2016

GarbledCPU: a MIPS processor for secure computation in hardware

Ebrahim M. Songhori; Shaza Zeitouni; Ghada Dessouky; Thomas Schneider; Ahmad-Reza Sadeghi; Farinaz Koushanfar

We present GarbledCPU, the first framework that realizes a hardware-based general purpose sequential processor for secure computation. Our MIPS-based implementation enables development of applications (functions) in a high-level language while performing secure function evaluation (SFE) using Yaos garbled circuit protocol in hardware. GarbledCPU provides three degrees of freedom for SFE which allow leveraging the trade-off between privacy and performance: public functions, private functions, and semi-private functions. We synthesize GarbledCPU on a Virtex-7 FPGA as a proof-of-concept implementation and evaluate it on various benchmarks including Hamming distance, private set intersection and AES. Our results indicate that our pipelined hardware framework outperforms the fastest available software implementation.


wireless network security | 2017

SeED: se cure non-interactive attestation for e mbedded d evices

Ahmad Ibrahim; Ahmad-Reza Sadeghi; Shaza Zeitouni

Remote attestation is a security service that is typically realized by an interactive challenge-response protocol that allows a trusted verifier to capture the state of a potentially untrusted remote device. However, existing attestation schemes are vulnerable to Denial of Service (DoS) attacks, which can be carried out by swamping the targeted device with fake attestation requests. In this paper, we propose SeED, the first non-interactive attestation protocol that mitigates DoS attacks and is highly efficient. Designing such a protocol is not straightforward, since it relies on a potentially malicious prover to trigger the attestation process. We investigate the related challenges and subtleties and describe how to address them with minimal assumptions. As evaluation results show, our non-interactive attestation protocol is particularly suitable for resource-constrained embedded devices, since it is highly efficient in terms of power consumption and communication.


design automation conference | 2017

LO-FAT: Low-Overhead Control Flow ATtestation in Hardware

Ghada Dessouky; Shaza Zeitouni; Thomas Nyman; Andrew Paverd; Lucas Davi; Patrick Koeberl; N. Asokan; Ahmad-Reza Sadeghi

Attacks targeting software on embedded systems are becoming increasingly prevalent. Remote attestation is a mechanism that allows establishing trust in embedded devices. However, existing attestation schemes are either static and cannot detect control-flow attacks, or require instrumentation of software incurring high performance overheads. To overcome these limitations, we present LO-FAT, the first practical hardware-based approach to control-flow attestation. By leveraging existing processor hardware features and commonly-used IP blocks, our approach enables efficient control-flow attestation without requiring software instrumentation. We show that our proof-of-concept implementation based on a RISC-V SoC incurs no processor stalls and requires reasonable area overhead.


design automation conference | 2018

It's hammer time: how to attack (rowhammer-based) DRAM-PUFs

Shaza Zeitouni; David Gens; Ahmad-Reza Sadeghi

Physically Unclonable Functions (PUFs) are still considered promising technology as building blocks in cryptographic protocols. While most PUFs require dedicated circuitry, recent research leverages DRAM hardware for PUFs due to its intrinsic properties and wide deployment. Recently, a new memory-based PUF was proposed that utilizes the infamous Rowhammer effect in DRAM. In this paper, we show two remote attacks on DRAM-based PUFs. First, a DoS attack that exploits the Rowhammer effect to manipulate PUF responses. Second, a modeling attack that predicts PUF responses by observing few challenge-response pairs. Our results indicate that DRAM may not be suitable for PUFs.


ieee symposium on security and privacy | 2017

ACM CCS 2016 Interviews, Part 1

Ahmad-Reza Sadeghi; Shaza Zeitouni

IEEE Security & Privacy met with several interesting speakers at the 23rd ACM Conference on Computer and Communications Security (CCS), held 24-28 October 2016 in Vienna. IEEE S&P is highlighting these interviews in its Spotlight department. This issue features Turing Award winner Martin Hellman, who discusses issues including marriage and international security.


wireless network security | 2016

DARPA: Device Attestation Resilient to Physical Attacks

Ahmad Ibrahim; Ahmad-Reza Sadeghi; Gene Tsudik; Shaza Zeitouni


network and distributed system security symposium | 2017

Pushing the Communication Barrier in Secure Computation using Lookup Tables

Ghada Dessouky; Farinaz Koushanfar; Ahmad-Reza Sadeghi; Thomas Schneider; Shaza Zeitouni; Michael Zohner


wireless network security | 2017

SeED: Secure Non-Interactive Attestation for Embedded Devices

Ahmad Ibrahim; Ahmad-Reza Sadeghi; Shaza Zeitouni

Collaboration


Dive into the Shaza Zeitouni's collaboration.

Top Co-Authors

Avatar

Ahmad-Reza Sadeghi

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Ghada Dessouky

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Ahmad Ibrahim

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Thomas Schneider

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Lucas Davi

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Michael Zohner

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge