Revisiting Challenges for Selective Data Protection of Real Applications

05/29/2021
by   Lin Ma, et al.
0

Selective data protection is a promising technique to defend against the data leakage attack. In this paper, we revisit technical challenges that were neglected when applying this protection to real applications. These challenges include the secure input channel, granularity conflict, and sensitivity conflict. We summarize the causes of them and propose corresponding solutions. Then we design and implement a prototype system for selective data protection and evaluate the overhead using the RISC-V Spike simulator. The evaluation demonstrates the efficiency (less than 3 and the security guarantees provided by our system.

READ FULL TEXT
research
10/12/2018

Time Protection: the Missing OS Abstraction

Timing channels enable data leakage that threatens the security of compu...
research
02/24/2022

A Holistic View on Data Protection for Sharing, Communicating, and Computing Environments: Taxonomy and Future Directions

The data is an important asset of an organization and it is essential to...
research
05/21/2019

SvTPM: A Secure and Efficient vTPM in the Cloud

Virtual Trusted Platform Modules (vTPMs) have been widely used in commer...
research
03/13/2018

An Efficient Data Protection Architecture Based on Fragmentation and Encryption

In this thesis, a completely revisited data protection scheme based on s...
research
04/05/2018

A Fast Fragmentation Algorithm For Data Protection In a Multi-Cloud Environment

Data fragmentation and dispersal over multiple clouds is a way of data p...
research
12/03/2020

Technical Report: Selective Imaging of File System Data on Live Systems

In contrast to the common habit of taking full bitwise copies of storage...
research
09/12/2023

CToMP: A Cycle-task-oriented Memory Protection Scheme for Unmanned Systems

Memory corruption attacks (MCAs) refer to malicious behaviors of system ...

Please sign up or login with your details

Forgot password? Click here to reset