Tue 22 Oct 2024 09:30 - 09:55 at Pasadena - Opening Session
The Fog of Trust protocol was supposed to allow a prover Peggy and a verifier Victor to perform a secure multiparty computation to determine the number of third parties that Victor trusted and that vouched for a certain property of Peggy. We intended to use formal methods to first state and then prove the privacy properties of the protocol. Instead, the analysis lead to the discovery of two previously unknown design failures that allow an adversary to break the privacy assurances the protocol was expected to provide. This paper briefly presents the Fog of Trust protocol and the vulnerabilities, which at this point we are unable to fix.
Tue 22 OctDisplayed time zone: Pacific Time (US & Canada) change
Tue 22 Oct
Displayed time zone: Pacific Time (US & Canada) change
09:00 - 10:30 | |||
09:00 10mDay opening | Welcome from Todd Millstein JENSFEST Todd Millstein University of California at Los Angeles | ||
09:10 20mKeynote | Coccinelle: Program transformation in the real world JENSFEST Julia Lawall Inria | ||
09:30 25mTalk | Lost and Found in the Fog of Trust JENSFEST | ||
09:55 25mTalk | MiniJava on RISC-V: A Game of Global Compilers Domination JENSFEST Jack Forden Marquette University, Alexander Gebhard Marquette University, Maverick Berner Marquette University, Dennis Brylow Marquette University |