Sajin Sasy

ORCID: 0000-0003-3447-1006
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Security and Verification in Computing
  • Privacy-Preserving Technologies in Data
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Data Storage Technologies
  • Stochastic Gradient Optimization Techniques
  • Interconnection Networks and Systems
  • Social Robot Interaction and HRI
  • Network Security and Intrusion Detection
  • Psychological and Educational Research Studies
  • Semiconductor materials and devices
  • AI in Service Interactions
  • Parallel Computing and Optimization Techniques
  • Diamond and Carbon-based Materials Research
  • Machine Learning and Data Classification
  • Cloud Data Security Solutions
  • Digital Rights Management and Security

University of Waterloo
2017-2024

We are witnessing a confluence between applied cryptography and secure hardware systems in enabling cloud computing.On one hand, work has enabled efficient, oblivious data-structures memory primitives.On the other, emergence of Intel SGX low-overhead mass market mechanism for isolated execution.By themselves these technologies have their disadvantages.Oblivious primitives carry high performance overheads, especially when run non-interactively.Intel SGX, while more suffers from numerous...

10.14722/ndss.2018.23239 article EN 2018-01-01

Service robots are becoming a widespread tool for assisting humans in scientific, industrial and even domestic settings. Yet, our understanding of how to motivate sustain interactions between human users remains limited. In this work, we conducted study investigate surprising robot behaviour evokes curiosity influences trust engagement the context participants interacting with Recyclo, service providing recycling recommendations. Wizard-of-Oz experiment, 36 were asked interact Recyclo...

10.1109/roman.2017.8172365 article EN 2017-08-01

Abstract Anonymous communications networks enable individuals to maintain their privacy online. The most popular such network is Tor, with about two million daily users; however, Tor reaching limits of its scalability. One the main scalability bottlenecks and similar designs originates from requirement distributing a global view servers in all clients. This place avoid epistemic attacks , which adversaries who know parts certain clients do not can rule or out those being responsible for...

10.2478/popets-2019-0050 article EN cc-by-nc-nd Proceedings on Privacy Enhancing Technologies 2019-07-01

Hyperparameter optimization is a ubiquitous challenge in machine learning, and the performance of trained model depends crucially upon their effective selection. While rich set tools exist for this purpose, there are currently no practical hyperparameter selection methods under constraint differential privacy (DP). We study honest differentially private which process tuning accounted overall budget. To end, we i) show that standard composition outperform more advanced techniques many...

10.1609/aaai.v36i7.20749 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2022-06-28

Protecting metadata of communications has been an area active research since the dining cryptographers problem was introduced by David Chaum in 1988. The Snowden revelations from 2013 resparked this direction. Consequently over last decade we have witnessed a flurry novel systems designed to protect users' online. However, such leverage different assumptions and design choices achieve their goal; resulting scattered view desirable properties, potential vulnerabilities, limitations existing...

10.56553/popets-2024-0030 article EN cc-by Proceedings on Privacy Enhancing Technologies 2023-10-22

Several privacy-preserving analytics frameworks have been proposed that use trusted execution environments (TEEs) like Intel SGX. Such often compaction and shuffling as core primitives. However, due to advances in TEE side-channel attacks, these primitives, the applications them, should be fully oblivious; is, perform instruction sequences memory accesses do not depend on secret inputs. obliviousness would eliminate threat of leaking private information through or timing side channels, but...

10.1145/3548606.3560603 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2022-11-07

As more privacy-preserving solutions leverage trusted execution environments (TEEs) like Intel SGX, it becomes pertinent that these can by design thwart TEE side-channel attacks research has brought to light. In particular, such need be fully oblivious circumvent leaking private information through memory or timing side channels.

10.1145/3576915.3623133 article EN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security 2023-11-15

We present Private Random Access Computations (PRAC), a 3-party Secure Multi-Party Computation (MPC) framework to support random-access data structure algorithms for MPC with efficient communication in terms of rounds and bandwidth. PRAC extends the state-of-the-art DORAM Duoram new implementation, more flexibility how memory is shared, Incremental Wide DPFs. then use these DPF extensions achieve algorithmic improvements three novel oblivious protocols MPC. exploits observation that secure...

10.56553/popets-2024-0100 article EN Proceedings on Privacy Enhancing Technologies 2024-06-25

We study secure and privacy-preserving data analysis based on queries executed samples from a dataset. Trusted execution environments (TEEs) can be used to protect the content of during query computation, while supporting differential-private (DP) in TEEs provides record privacy when output is revealed. Support for sample-based attractive due \emph{privacy amplification} since not all dataset answer but only small subset. However, extracting with proving strong DP guarantees trivial as...

10.48550/arxiv.2009.13689 preprint EN other-oa arXiv (Cornell University) 2020-01-01

Hyperparameter optimization is a ubiquitous challenge in machine learning, and the performance of trained model depends crucially upon their effective selection. While rich set tools exist for this purpose, there are currently no practical hyperparameter selection methods under constraint differential privacy (DP). We study honest differentially private which process tuning accounted overall budget. To end, we i) show that standard composition outperform more advanced techniques many...

10.48550/arxiv.2111.04906 preprint EN other-oa arXiv (Cornell University) 2021-01-01
Coming Soon ...