Revisiting Challenges for Selective Data Protection of Real Applications

by   Lin Ma, et al.

Selective data protection is a promising technique to defend against the data leakage attack. In this paper, we revisit technical challenges that were neglected when applying this protection to real applications. These challenges include the secure input channel, granularity conflict, and sensitivity conflict. We summarize the causes of them and propose corresponding solutions. Then we design and implement a prototype system for selective data protection and evaluate the overhead using the RISC-V Spike simulator. The evaluation demonstrates the efficiency (less than 3 and the security guarantees provided by our system.


Time Protection: the Missing OS Abstraction

Timing channels enable data leakage that threatens the security of compu...

A Holistic View on Data Protection for Sharing, Communicating, and Computing Environments: Taxonomy and Future Directions

The data is an important asset of an organization and it is essential to...

SvTPM: A Secure and Efficient vTPM in the Cloud

Virtual Trusted Platform Modules (vTPMs) have been widely used in commer...

Technical Report: Selective Imaging of File System Data on Live Systems

In contrast to the common habit of taking full bitwise copies of storage...

A Fast Fragmentation Algorithm For Data Protection In a Multi-Cloud Environment

Data fragmentation and dispersal over multiple clouds is a way of data p...

Privacy of Autonomous Vehicles: Risks, Protection Methods, and Future Directions

Recent advances in machine learning have enabled its wide application in...

How Design, Architecture, and Operation of Modern Systems Conflict with GDPR

In recent years, our society is being plagued by unprecedented levels of...