1 / 5

LLSS: Toward System Support for Plugging Privacy Leaks

LLSS: Toward System Support for Plugging Privacy Leaks. Privacy leak scenario. Alice. Bob. Despite Alice’s best efforts, Bob’s best intentions, and no system compromises. Frighteningly plausible. “Usability and privacy: a study of Kazaa…” Good and Krekelberg, SigCHI 2003

sunila
Télécharger la présentation

LLSS: Toward System Support for Plugging Privacy Leaks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. LLSS: Toward System Support for Plugging Privacy Leaks

  2. Privacy leak scenario Alice Bob Despite Alice’s best efforts, Bob’s best intentions, and no system compromises ...

  3. Frighteningly plausible • “Usability and privacy: a study of Kazaa…” • Good and Krekelberg, SigCHI 2003 • In 12 hours, found 150 inboxes on Kazaa • Observed people downloading them • Problem • People don’t understand software interactions • LLSS [“Loose Lips Sink Ships”]

  4. LLSS approach • Ask users What and Who, not How • Help users define system meta-data • Find sensitive files (email, ssn, cc numbers) • Infer other trusted hosts • Use meta-data to identify potential leaks • Interpose on file system and socket syscalls • Use speculative execution to detect leaks

  5. Questions?

More Related