1 / 5

LLSS: Toward System Support for Plugging Privacy Leaks

Explore a privacy leak scenario between Alice and Bob despite their efforts, with a system support approach. Learn from the Kazaa study on usability and privacy, emphasizing the importance of user understanding and metadata. Discover the Loose Lips Sink Ships (LLSS) strategy, focusing on sensitive files and trusted hosts to prevent leaks by interposing on system calls and using speculative execution. Have questions? Let's secure your privacy.

sunila
Download Presentation

LLSS: Toward System Support for Plugging Privacy Leaks

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. LLSS: Toward System Support for Plugging Privacy Leaks

  2. Privacy leak scenario Alice Bob Despite Alice’s best efforts, Bob’s best intentions, and no system compromises ...

  3. Frighteningly plausible • “Usability and privacy: a study of Kazaa…” • Good and Krekelberg, SigCHI 2003 • In 12 hours, found 150 inboxes on Kazaa • Observed people downloading them • Problem • People don’t understand software interactions • LLSS [“Loose Lips Sink Ships”]

  4. LLSS approach • Ask users What and Who, not How • Help users define system meta-data • Find sensitive files (email, ssn, cc numbers) • Infer other trusted hosts • Use meta-data to identify potential leaks • Interpose on file system and socket syscalls • Use speculative execution to detect leaks

  5. Questions?

More Related