LAMA: Leakage-Abuse Attacks Against Microsoft Always Encrypted.
Ryan SeahDaren KhuAlexander HooverRuth NgPublished in: IACR Cryptol. ePrint Arch. (2024)
Keyphrases
- information leakage
- stepping stones
- countermeasures
- denial of service attacks
- business intelligence
- traffic analysis
- watermarking scheme
- terrorist attacks
- personal information
- security protocols
- microsoft windows
- attack detection
- encryption key
- cryptographic protocols
- security risks
- security mechanisms
- malicious users
- mouse clicks