DocumentCode :
1944178
Title :
Preventing Information Leaks through Shadow Executions
Author :
Capizzi, Roberto ; Longo, Antonio ; Venkatakrishnan, V.N. ; Sistla, A. Prasad
Author_Institution :
Politec. di Milano, Milan
fYear :
2008
fDate :
8-12 Dec. 2008
Firstpage :
322
Lastpage :
331
Abstract :
A concern about personal information confidentiality typically arises when any desktop application communicates to the external network, for example, to its producer´s server for obtaining software version updates. We address this confidentiality concern of end users by an approach called shadow execution. A key property of shadow execution is that it allows applications to successfully communicate over the network while disallowing any information leaks. We describe the design and implementation of this approach for Windows applications. Experiments with our prototype implementation indicate that shadow execution allows applications to execute without inhibiting any behaviors, has acceptable performance overheads while preventing any information leaks.
Keywords :
security of data; information leaks; personal information confidentiality; shadow execution; Application software; Computer security; Credit cards; Displays; Internet; Network servers; Operating systems; Prototypes; Robustness; Software tools; Confidentiality; Information Flow; Privacy; Shadow Execution; Virtual Machines;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Security Applications Conference, 2008. ACSAC 2008. Annual
Conference_Location :
Anaheim, CA
ISSN :
1063-9527
Print_ISBN :
978-0-7695-3447-3
Type :
conf
DOI :
10.1109/ACSAC.2008.50
Filename :
4721569
Link To Document :
بازگشت