{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T16:10:48Z","timestamp":1765728648099,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,30]],"date-time":"2017-10-30T00:00:00Z","timestamp":1509321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1618269, 1319994"],"award-info":[{"award-number":["1618269, 1319994"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N0001416WX01489"],"award-info":[{"award-number":["N0001416WX01489"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,30]]},"DOI":"10.1145\/3133956.3134051","type":"proceedings-article","created":{"date-parts":[[2017,10,27]],"date-time":"2017-10-27T12:48:18Z","timestamp":1509108498000},"page":"507-521","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Deterministic, Stash-Free Write-Only ORAM"],"prefix":"10.1145","author":[{"given":"Daniel S.","family":"Roche","sequence":"first","affiliation":[{"name":"United States Naval Academy, Annapolis, MD, USA"}]},{"given":"Adam","family":"Aviv","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, MD, USA"}]},{"given":"Seung Geol","family":"Choi","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, MD, USA"}]},{"given":"Travis","family":"Mayberry","sequence":"additional","affiliation":[{"name":"United States Naval Academy, Annapolis, MD, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,10,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_6"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23188"},{"volume-title":"Kefei Chen, Qi Xie, Weidong Qiu, Ninghui Li, and Wen-Guey Tzeng (Eds.)","author":"Blanton Marina","key":"e_1_3_2_2_3_1","unstructured":"Marina Blanton, Aaron Steele, and Mehrdad Aliasgari. 2013. Data-oblivious graph algorithms for secure computation and outsourcing ASIACCS 13, Kefei Chen, Qi Xie, Weidong Qiu, Ninghui Li, and Wen-Guey Tzeng (Eds.). ACM Press, Hangzhou, China, 207--218."},{"volume-title":"Gail-Joon Ahn","author":"Blass Erik-Oliver","key":"e_1_3_2_2_4_1","unstructured":"Erik-Oliver Blass, Travis Mayberry, Guevara Noubir, and Kaan Onarlioglu 2014. Toward Robust Hidden Volumes Using Write-Only Oblivious RAM ACM CCS 14, Gail-Joon Ahn, Moti Yung, and Ninghui Li (Eds.). ACM Press, Scottsdale, AZ, USA, 203--214."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2017-0035"},{"key":"e_1_3_2_2_6_1","volume-title":"DataLair: Efficient Block Storage with Plausible Deniability against Multi-Snapshot Adversaries. CoRR","author":"Chakraborti Anrin","year":"2017","unstructured":"Anrin Chakraborti, Chen Chen, and Radu Sion 2017. DataLair: Efficient Block Storage with Plausible Deniability against Multi-Snapshot Adversaries. CoRR Vol. abs\/1706.10276 (2017)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818046"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694353"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/233551.233553"},{"volume-title":"Ting Yu","author":"Gordon S. Dov","key":"e_1_3_2_2_10_1","unstructured":"S. Dov Gordon, Jonathan Katz, Vladimir Kolesnikov, Fernando Krell, Tal Malkin, Mariana Raykova, and Yevgeniy Vahlis 2012. Secure two-party computation in sublinear (amortized) time ACM CCS 12, Ting Yu, George Danezis, and Virgil D. Gligor (Eds.). ACM Press, Raleigh, NC, USA, 513--524."},{"key":"e_1_3_2_2_11_1","volume-title":"USENIX Security 16","author":"Jia Yaoqi","year":"2016","unstructured":"Yaoqi Jia, Tarik Moataz, Shruti Tople, and Prateek Saxena. 2016. OblivP2P: An Oblivious Peer-to-Peer Content Sharing System 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10-12, 2016. 945--962."},{"key":"e_1_3_2_2_13_1","volume-title":"Martin Maas, Michael W. Hicks, Mohit Tiwari, and Elaine Shi.","author":"Liu Chang","year":"2015","unstructured":"Chang Liu, Austin Harris, Martin Maas, Michael W. Hicks, Mohit Tiwari, and Elaine Shi. 2015. GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation Proceedings of the Twentieth International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS '15, Istanbul, Turkey, March 14--18, 2015. 87--101."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.46"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.29"},{"key":"e_1_3_2_2_16_1","volume-title":"Efficient Private File Retrieval by Combining ORAM and PIR NDSS","author":"Mayberry Travis","year":"2014","unstructured":"Travis Mayberry, Erik-Oliver Blass, and Agnes Hui Chan. 2014. Efficient Private File Retrieval by Combining ORAM and PIR NDSS 2014. The Internet Society, San Diego, CA, USA."},{"key":"e_1_3_2_2_17_1","volume-title":"Third International Workshop, IH'99","author":"Andrew","year":"1999","unstructured":"Andrew D. McDonald and Markus G. Kuhn 1999. StegFS: A Steganographic File System for Linux. Information Hiding, Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999, Proceedings. 462--477."},{"volume-title":"Indrajit Ray, Ninghui Li, and Christopher Kruegel: (Eds.)","author":"Moataz Tarik","key":"e_1_3_2_2_18_1","unstructured":"Tarik Moataz, Travis Mayberry, and Erik-Oliver Blass. 2015. Constant Communication ORAM with Small Blocksize ACM CCS 15, Indrajit Ray, Ninghui Li, and Christopher Kruegel: (Eds.). ACM Press, Denver, CO, USA, 862--873."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23349"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2003.1260829"},{"key":"e_1_3_2_2_21_1","volume-title":"Paterson and Mario Strefler","author":"Kenneth","year":"2015","unstructured":"Kenneth G. Paterson and Mario Strefler 2015. A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System ASIACCS 15, Feng Bao, Steven Miller, Jianying Zhou, and Gail-Joon Ahn (Eds.). ACM Press, Singapore, 475--482."},{"key":"e_1_3_2_2_22_1","volume-title":"Encrypted File System for Log-Structured Storage NDSS","author":"Peters Timothy","year":"2015","unstructured":"Timothy Peters, Mark Gondree, and Zachary N. J. Peterson. 2015. DEFY: A Deniable, Encrypted File System for Log-Structured Storage NDSS 2015. The Internet Society, San Diego, CA, USA."},{"key":"e_1_3_2_2_23_1","first-page":"12","article-title":"Constants Count: Practical Improvements to Oblivious RAM 24th USENIX Security Symposium","author":"Ren Ling","year":"2015","unstructured":"Ling Ren, Christopher W. Fletcher, Albert Kwon, Emil Stefanov, Elaine Shi, Marten van Dijk, and Srinivas Devadas 2015. Constants Count: Practical Improvements to Oblivious RAM 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12--14, 2015. 415--430.","journal-title":"USENIX Security 15, Washington, D.C., USA"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.19"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.20"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2013.56"},{"key":"e_1_3_2_2_27_1","volume-title":"ObliviStore: High Performance Oblivious Cloud Storage 2013 IEEE Symposium on Security and Privacy. IEEE Computer Society Press","author":"Stefanov Emil","year":"2013","unstructured":"Emil Stefanov and Elaine Shi 2013. ObliviStore: High Performance Oblivious Cloud Storage 2013 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Berkeley, CA, USA, 253--267."},{"key":"e_1_3_2_2_28_1","volume-title":"ObliviStore: High Performance Oblivious Distributed Cloud Data Store NDSS","author":"Stefanov Emil","year":"2013","unstructured":"Emil Stefanov and Elaine Shi 2013. ObliviStore: High Performance Oblivious Distributed Cloud Data Store NDSS 2013. The Internet Society, San Diego, CA, USA."},{"volume-title":"Ahmad-Reza Sadeghi, Virgil D","author":"Stefanov Emil","key":"e_1_3_2_2_29_1","unstructured":"Emil Stefanov, Marten van Dijk, Elaine Shi, Christopher W. Fletcher, Ling Ren, Xiangyao Yu, and Srinivas Devadas 2013. Path ORAM: an extremely simple oblivious RAM protocol ACM CCS 13, Ahmad-Reza Sadeghi, Virgil D. Gligor, and Moti Yung (Eds.). ACM Press, Berlin, Germany, 299--310."},{"key":"e_1_3_2_2_30_1","volume-title":"Brief Announcement: Secure data structures based on multi-party computation 30th ACM PODC, Cyril Gavoille and Pierre Fraigniaud (Eds.)","author":"Toft Tomas","year":"2011","unstructured":"Tomas Toft. 2011. Brief Announcement: Secure data structures based on multi-party computation 30th ACM PODC, Cyril Gavoille and Pierre Fraigniaud (Eds.). ACM, San Jose, CA, USA, 291--292."},{"key":"e_1_3_2_2_31_1","unstructured":"TrueCrypt. 2017. (discontinued). (2017). http:\/\/www.truecrypt.org\/."},{"volume-title":"Indrajit Ray, Ninghui Li, and Christopher Kruegel: (Eds.)","author":"Wang Xiao","key":"e_1_3_2_2_32_1","unstructured":"Xiao Wang, T.-H. Hubert Chan, and Elaine Shi 2015. Circuit ORAM: On Tightness of the Goldreich-Ostrovsky Lower Bound ACM CCS 15, Indrajit Ray, Ninghui Li, and Christopher Kruegel: (Eds.). ACM Press, Denver, CO, USA, 850--861."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660314"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.21"}],"event":{"name":"CCS '17: 2017 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Dallas Texas USA","acronym":"CCS '17"},"container-title":["Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134051","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134051","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3133956.3134051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:03Z","timestamp":1750212663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3133956.3134051"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,30]]},"references-count":33,"alternative-id":["10.1145\/3133956.3134051","10.1145\/3133956"],"URL":"https:\/\/doi.org\/10.1145\/3133956.3134051","relation":{},"subject":[],"published":{"date-parts":[[2017,10,30]]},"assertion":[{"value":"2017-10-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}