A Hypervisor-Based Privacy Agent for Mobile and IoT Systems

被引:6
|
作者
Klingensmith, Neil [1 ]
Kim, Younghyun [1 ]
Banerjee, Suman [2 ]
机构
[1] Univ Wisconsin, Elect & Comp Engn, Madison, WI 53706 USA
[2] Univ Wisconsin, Comp Sci, Madison, WI 53706 USA
基金
美国国家科学基金会;
关键词
Privacy; Mobile Systems; IoT; Hypervisors; Real-time;
D O I
10.1145/3301293.3302356
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a design for a mobile and IoT data privacy agent that lives in software on end devices. Our privacy agent learns and enforces a user's privacy policy across all devices that he manages. Implemented as a hypervisor onboard the end device, our privacy agent sits between the device's hardware and its application software. It can inspect, modify, block, and inject I/O traffic between the device's main CPU and its peripherals. The key advantage of our architecture is that, unlike network middleboxes, the hypervisor can track all I/O transactions in unencrypted form. This makes our privacy agent potentially much more effective than those that only monitor network traffic because it can track and modify plaintext data. Our privacy agent also gives users the ability to impose a uniform privacy policy across all devices that they manage, which minimizes the burden and possibility of error that arise when setting privacy policy on individual devices. Since the notion of per-user (as opposed to per-app) privacy policy is relatively new, there has not been much opportunity for researchers to think about how to define and implement policy on that scale. We propose a method for learning a user's privacy policy one time and automatically implementing it in a context-aware fashion on multiple devices.
引用
下载
收藏
页码:21 / 26
页数:6
相关论文
共 50 条
  • [1] HIMA: A Hypervisor-Based Integrity Measurement Agent
    Azab, Ahmed M.
    Ning, Peng
    Sezer, Emre C.
    Zhang, Xiaolan
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 461 - +
  • [2] Hypervisor-Based Protection of Code
    Kiperberg, Michael
    Leon, Roee
    Resh, Amit
    Algawi, Asaf
    Zaidenberg, Nezer J.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (08) : 2203 - 2216
  • [3] A Survey on Hypervisor-based Virtualization of Embedded Reconfigurable Systems
    Wulf, Cornelia
    Willig, Michael
    Goehringer, Diana
    2021 31ST INTERNATIONAL CONFERENCE ON FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS (FPL 2021), 2021, : 249 - 256
  • [4] RAMinate: Hypervisor-based Virtualization for Hybrid Main Memory Systems
    Hirofuchi, Takahiro
    Takano, Ryousei
    PROCEEDINGS OF THE SEVENTH ACM SYMPOSIUM ON CLOUD COMPUTING (SOCC 2016), 2016, : 112 - 125
  • [5] Towards Hierarchical Scheduling of Dependent Systems with Hypervisor-based Virtualization
    Jatzkowski, Jan
    Kreutz, Marcio
    Rettberg, Achim
    PROCEEDINGS OF THE 2015 ELECTRONIC SYSTEM LEVEL SYNTHESIS CONFERENCE (ESLSYN), 2015, : 28 - 33
  • [6] Hypervisor-based Attestation of Virtual Environments
    Lauer, Hagen
    Kuntze, Nicolai
    2016 INT IEEE CONFERENCES ON UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING AND COMMUNICATIONS, CLOUD AND BIG DATA COMPUTING, INTERNET OF PEOPLE, AND SMART WORLD CONGRESS (UIC/ATC/SCALCOM/CBDCOM/IOP/SMARTWORLD), 2016, : 333 - 340
  • [7] Hypervisor-Based White Listing of Executables
    Leon, Roee S.
    Kiperberg, Michael
    Zabag, Anat Anatey Leon
    Resh, Amit
    Algawi, Asaf
    Zaidenberg, Nezer J.
    IEEE SECURITY & PRIVACY, 2019, 17 (05) : 58 - 67
  • [8] Hermes: A Real Time Hypervisor for Mobile and IoT Systems
    Klingensmith, Neil
    Banerjee, Suman
    HOTMOBILE'18: PROCEEDINGS OF THE 19TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS & APPLICATIONS, 2018, : 101 - 106
  • [9] NV-Hypervisor: Hypervisor-based Persistence for Virtual Machines
    Sartakov, Vasily A.
    Kapitza, Ruediger
    2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN), 2014, : 654 - 659
  • [10] Hypervisor-based malware protection with AccessMiner
    Fattori, Aristide
    Lanzi, Andrea
    Balzarotti, Davide
    Kirda, Engin
    COMPUTERS & SECURITY, 2015, 52 : 33 - 50