news

Dec 02, 2025 Our paper, Leafblower: a Leakage Attack Against TEE-Based Encrypted Databases will appear at IEEE S&P ‘26. In this work, we propose a new leakage attack against TEE-based EDBs which use B+-trees in the multi-snapshot external memory model, a weaker adversary which only observes snapshots of the encrypted database index files after each operation.
Nov 01, 2025 Our paper, Updatable Private Set Intersection from Structured Encryption will appear at CiC ‘26 (Volume 4, Issue 2). We propose a new framework for the problem of updatable PSI — with elements being inserted and deleted — in the semi-honest model based on structured encryption.
Oct 01, 2025 Our paper, Structured Encryption and Distribution-Aware Leakage Suppression will appear at Asiacrypt ‘25. We propose a new query equality (qeq) suppressor for dictionary encryption schemes that results in practical, static qeq-hiding encrypted dictionaries at the cost of revealing the distribution of the queries.
Aug 01, 2025 Our paper, PolySys: an Algebraic Leakage Attack Engine will appear at USENIX Security ‘25. In this paper, we propose a novel framework called PolySys for modeling and designing leakage attacks as constraint-solving algorithms over polynomial systems.
Apr 01, 2025 Our paper, Bayesian Leakage Analysis: A Framework for Analyzing Leakage in Cryptography will appear at CiC ‘25 (Volume 2, Issue 1). In this work, we propose a Bayesian framework to evaluate cryptographic leakage and its vulnerability to inference attacks.
Dec 01, 2024 Our paper, Concurrent Encrypted Multi-Maps will appear at Asiacrypt ‘24. In this work, we initiate the study of concurrent encrypted data structures and identify several challenges introduced by concurrency in encrypted search.
Aug 01, 2022 After an incredible two years in the entrepreneurial space, I joined MongoDB following the acquisition of Aroki Systems!