Skip to main content

Attacks against SSE

·563 words·3 mins
Ra-226
Author
Ra-226
A little bit about you
Table of Contents

Table of Contents
#

  1. Symmetric Searchable Encryption
  2. Leakage abuse attack
  3. File Injection attack
  4. Inference attack

Symmetric Searchable Encryption
#

Dawn Xiaodong Song, David A. Wagner, and Adrian Perrig. Practical techniques for searches on encrypted data S&P'00 A cornerstone technique in encrypted search research

Eu-Jin Goh. Secure Indexes IACR

Reza Curtmola, Juan A. Garay, Seny Kamara, and Rafail Ostrovsky. Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions CCS'06 Formal leakage of information

Known data attack (Leakage abuse attack)
#

Mohammad Saiful Islam, Mehmet Kuzu, and Murat Kantarcioglu. Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation NDSS'12 Access pattern leakage

Chang Liu, Liehuang Zhu, Mingzhong Wang, and Yu-an Tan. Search Pattern Leakage in Searchable Encryption: Attacks and New Construction Inf. Sci.‘14 Search pattern leakage

David Cash, Paul Grubbs, Jason Perry, and Thomas Ristenpart. Leakage-Abuse Attacks Against Searchable Encryption CCS'15 a classic one

Laura Blackstone, Seny Kamara, and Tarik Moataz. Revisiting Leakage Abuse Attacks NDSS'20

Jianting Ning, Xinyi Huang, Geong Sen Poh, Jiaming Yuan, Yingjiu Li, Jian Weng, and Robert H. Deng. LEAP: Leakage-Abuse Attack on Efficiently Deployable, Efficiently Searchable Encryption with Partially Known Dataset CCS'21

Steven Lambregts, Huanhuan Chen, Jianting Ning, and Kaitai Liang. VAL: Volume and Access Pattern Leakage-Abuse Attack with Leaked Documents ESORICS'22

Lei Xu, Anxin Zhou, Huayi Duan, Cong Wang, Qian Wang, and Xiaohua Jia. Toward Full Accounting for Leakage Exploitation and Mitigation in Dynamic Encrypted Databases TDSC'23

Lei Xu, Leqian Zheng, Chengzhi Xu, Xingliang Yuan, and Cong Wang. Leakage-Abuse Attacks Against Forward and Backward Private Searchable Symmetric Encryption CCS'23

File Injection attack
#

Yupeng Zhang, Jonathan Katz, and Charalampos Papamanthou. All Your Queries Are Belong to Us: The Power of File-Injection Attacks on Searchable Encryption USENIX Security'16

Rishabh Poddar, Stephanie Wang, Jianan Lu, and Raluca Ada Popa. Practical Volume-Based Attacks on Encrypted Databases EuroS&P'20

Laura Blackstone, Seny Kamara, and Tarik Moataz. Revisiting Leakage Abuse Attacks NDSS'20

Improved File-injection Attacks on Searchable Encryption Using Finite Set Theory The Computer Journal'21

Xianglong Zhang, Wei Wang, Peng Xu, Laurence T. Yang, and Kaitai Liang. High Recovery with Fewer Injections: Practical Binary Volumetric Injection Attacks against Dynamic Searchable Encryption USENIX Security'23

Tjard Langhout, Huanhuan Chen, and Kaitai Liang. File-Injection Attacks on Searchable Encryption, Based on Binomial Structures ESORICS'24

Lei Zhang, Jianfeng Wang, Jiaojiao Wu,Yunling Wang, and Shi-Feng Sun. Violin: Powerful Volumetric Injection Attack Against Searchable Encryption With Optimal Injection Size TDSC'25

Sampled data attack (Inference attack)
#

David Pouliot and Charles V. Wright. The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption CCS'16

Marc Damie, Florian Hahn, and Andreas Peter. A Highly Accurate Query-Recovery Attack against Searchable Encryption using Non-Indexed Documents USENIX Security'21 non-indexed documents

Simon Oya and Florian Kerschbaum. Hiding the Access Pattern is Not Enough: Exploiting Search Pattern Leakage in Searchable Encryption USENIX Security'21 An early work of likelihood estimation

Simon Oya and Florian Kerschbaum. IHOP: Improved Statistical Query Recovery against Searchable Symmetric Encryption through Quadratic Optimization USENIX Security'22 A good work

Zichen Gui, Kenneth G. Paterson, and Sikhar Patranabis. Rethinking Searchable Symmetric Encryption S&P'23

Zichen Gui, Kenneth G. Paterson, and Tianxin Tang. Security Analysis of MongoDB Queryable Encryption USENIX Security'23

Hao Nie, Wei Wang, Peng Xu, Xianglong Zhang, Laurence T. Yang, and Kaitai Liang. Query Recovery from Easy to Hard: Jigsaw Attack against SSE USENIX Security'24

Björn Ho, Huanhuan Chen, Zeshun Shi, and Kaitai Liang. Similar Data is Powerful: Enhancing Inference Attacks on SSE with Volume Leakages ESORICS'24

Related

基于似然估计的可搜索加密查询恢复攻击综述
·1772 words·9 mins
About me
·17 words·1 min