• DocumentCode
    1944178
  • Title

    Preventing Information Leaks through Shadow Executions

  • Author

    Capizzi, Roberto ; Longo, Antonio ; Venkatakrishnan, V.N. ; Sistla, A. Prasad

  • Author_Institution
    Politec. di Milano, Milan
  • fYear
    2008
  • fDate
    8-12 Dec. 2008
  • Firstpage
    322
  • Lastpage
    331
  • Abstract
    A concern about personal information confidentiality typically arises when any desktop application communicates to the external network, for example, to its producer´s server for obtaining software version updates. We address this confidentiality concern of end users by an approach called shadow execution. A key property of shadow execution is that it allows applications to successfully communicate over the network while disallowing any information leaks. We describe the design and implementation of this approach for Windows applications. Experiments with our prototype implementation indicate that shadow execution allows applications to execute without inhibiting any behaviors, has acceptable performance overheads while preventing any information leaks.
  • Keywords
    security of data; information leaks; personal information confidentiality; shadow execution; Application software; Computer security; Credit cards; Displays; Internet; Network servers; Operating systems; Prototypes; Robustness; Software tools; Confidentiality; Information Flow; Privacy; Shadow Execution; Virtual Machines;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computer Security Applications Conference, 2008. ACSAC 2008. Annual
  • Conference_Location
    Anaheim, CA
  • ISSN
    1063-9527
  • Print_ISBN
    978-0-7695-3447-3
  • Type

    conf

  • DOI
    10.1109/ACSAC.2008.50
  • Filename
    4721569