Preventing information leaks through shadow executions
R Capizzi, A Longo… - 2008 Annual …, 2008 - ieeexplore.ieee.org
R Capizzi, A Longo, VN Venkatakrishnan, AP Sistla
2008 Annual Computer Security Applications Conference (ACSAC), 2008•ieeexplore.ieee.orgA concern about personal information confidentiality typically arises when any desktop
application communicates to the external network, for example, to its producer's server for
obtaining software version updates. We address this confidentiality concern of end users by
an approach called shadow execution. A key property of shadow execution is that it allows
applications to successfully communicate over the network while disallowing any
information leaks. We describe the design and implementation of this approach for Windows …
application communicates to the external network, for example, to its producer's server for
obtaining software version updates. We address this confidentiality concern of end users by
an approach called shadow execution. A key property of shadow execution is that it allows
applications to successfully communicate over the network while disallowing any
information leaks. We describe the design and implementation of this approach for Windows …
A concern about personal information confidentiality typically arises when any desktop application communicates to the external network, for example, to its producer's server for obtaining software version updates. We address this confidentiality concern of end users by an approach called shadow execution. A key property of shadow execution is that it allows applications to successfully communicate over the network while disallowing any information leaks. We describe the design and implementation of this approach for Windows applications. Experiments with our prototype implementation indicate that shadow execution allows applications to execute without inhibiting any behaviors, has acceptable performance overheads while preventing any information leaks.
ieeexplore.ieee.org