16. 16
GPS Coordinates
Time Stamp
Hashed Values
Hashed Values
PoK pre-image
ZKP pre-image
validates certain
constraints
“I prove that I
have been in
two different
points (signed
by a trusted
entity)
separated by a
distance greater
than a threshold
and in a given
range of time”
Proving in Zero-Knowledge
18. Robustness
Assumption 1 (ideal world)
● The BST sends signed data that can be verified and
triangulated with GPS to protect GPS spoofing
[Oligieri et al. ACM WiSec19]
18
Assumption 2 (Our world)
● Interleave Safetynet/Devicecheck attestations with
GPS and BST data, triangulate, attest again
23. Evaluation
Number of gates for path range: 444K
Prover time (1 distances): ~16s
Total proof (linking two generated proofs): 20s (on PC)
Proof size: ~5MB
23
24. Choose your battle:
● Tradeoff #users #transactions vs. performance
● How often we proof?
● Which sensors are most fiable?
● Which are the weakest?
● Combining them how much battery drains? Plus the proof? How many times
a day?
● CAN PROOF BE FORGED?
25. Conclusion
● Our battle is to provide trusted data from sensors (i.e. blockchain oracles)
● Many users will be involved
● We will need an efficient solution, probably using textbook RSA signatures
26. The Attack of the Clones: A Study of the Impact of
Shared Code on Vulnerability Patching
27. We need to be in the machine
WINE-BR
► 8 Million Windows Hosts
Internet Users
Symantec Users
WINE Opted-in
WINE Users
10 Apps
28. One raɣ to rule them all: Inducing soft-errors by
gamma-ray emissions at ground level
28
31. Ground Level: Belgian Election Vs. Apple Vs. FBI
31
x …. 0 0 0 0 0
1 1 1 1 0
0 1
0
1 = 6080
= 1984
32. Can we reach an exploit from a neutron?
32
A system on Earth, at sea
level, with 4GB of RAM has
a 96% percent chance of
having a bit error in three
days without ECC RAM.