50 likes | 149 Views
Explore a privacy leak scenario between Alice and Bob despite their efforts, with a system support approach. Learn from the Kazaa study on usability and privacy, emphasizing the importance of user understanding and metadata. Discover the Loose Lips Sink Ships (LLSS) strategy, focusing on sensitive files and trusted hosts to prevent leaks by interposing on system calls and using speculative execution. Have questions? Let's secure your privacy.
E N D
Privacy leak scenario Alice Bob Despite Alice’s best efforts, Bob’s best intentions, and no system compromises ...
Frighteningly plausible • “Usability and privacy: a study of Kazaa…” • Good and Krekelberg, SigCHI 2003 • In 12 hours, found 150 inboxes on Kazaa • Observed people downloading them • Problem • People don’t understand software interactions • LLSS [“Loose Lips Sink Ships”]
LLSS approach • Ask users What and Who, not How • Help users define system meta-data • Find sensitive files (email, ssn, cc numbers) • Infer other trusted hosts • Use meta-data to identify potential leaks • Interpose on file system and socket syscalls • Use speculative execution to detect leaks