2008 Annual Computer Security Applications Conference (ACSAC) 2008
DOI: 10.1109/acsac.2008.50
|View full text |Cite
|
Sign up to set email alerts
|

Preventing Information Leaks through Shadow Executions

Abstract: A concern about personal information confidentiality typically arises when any desktop application communicates to the external network, for example, to its producer's server for obtaining software version updates. We address this confidentiality concern of end users by an approach called shadow execution. A key property of shadow execution is that it allows applications to successfully communicate over the network while disallowing any information leaks. We describe the design and implementation of this appro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
47
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 52 publications
(47 citation statements)
references
References 17 publications
0
47
0
Order By: Relevance
“…Two of the papers discussed above ( [16] and [12]) also consider SME-style approaches to information flow security in a browser. But there are important differences with FlowFox.…”
Section: Limitations and Future Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Two of the papers discussed above ( [16] and [12]) also consider SME-style approaches to information flow security in a browser. But there are important differences with FlowFox.…”
Section: Limitations and Future Workmentioning
confidence: 99%
“…They partition a program in two programs at source code level and use system call interposition to implement the I/O rules. In followup work, Capizzi et al [16] avoid the need for source level partitioning by means of shadow executions: they run two executions of processes for the H (secret) and L (public) security level to provide strong confidentiality guarantees. Devriese and Piessens [24] independently came up with the closely related technique they called SME, and they were the first to prove the strong soundness and precision guarantees that SME offers.…”
Section: Limitations and Future Workmentioning
confidence: 99%
See 2 more Smart Citations
“…However, prior methods of detecting noninterference have typically required access to the program running the system in question. These analyses either used the program for directly analyzing its code (see [9] for a survey), for running an instrumented version of the system (e.g., [10][11][12][13]), or for simulating multiple executions of the system (e.g., [14][15][16]). Traditionally, the requirement of access to the program has not been problematic since the analysis has been motivated as a tool for software engineers securing a program that they have designed.…”
Section: Prior Workmentioning
confidence: 99%