A Hypervisor-Based Privacy Agent for Mobile and IoT Systems

被引:6
|
作者
Klingensmith, Neil [1 ]
Kim, Younghyun [1 ]
Banerjee, Suman [2 ]
机构
[1] Univ Wisconsin, Elect & Comp Engn, Madison, WI 53706 USA
[2] Univ Wisconsin, Comp Sci, Madison, WI 53706 USA
基金
美国国家科学基金会;
关键词
Privacy; Mobile Systems; IoT; Hypervisors; Real-time;
D O I
10.1145/3301293.3302356
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a design for a mobile and IoT data privacy agent that lives in software on end devices. Our privacy agent learns and enforces a user's privacy policy across all devices that he manages. Implemented as a hypervisor onboard the end device, our privacy agent sits between the device's hardware and its application software. It can inspect, modify, block, and inject I/O traffic between the device's main CPU and its peripherals. The key advantage of our architecture is that, unlike network middleboxes, the hypervisor can track all I/O transactions in unencrypted form. This makes our privacy agent potentially much more effective than those that only monitor network traffic because it can track and modify plaintext data. Our privacy agent also gives users the ability to impose a uniform privacy policy across all devices that they manage, which minimizes the burden and possibility of error that arise when setting privacy policy on individual devices. Since the notion of per-user (as opposed to per-app) privacy policy is relatively new, there has not been much opportunity for researchers to think about how to define and implement policy on that scale. We propose a method for learning a user's privacy policy one time and automatically implementing it in a context-aware fashion on multiple devices.
引用
收藏
页码:21 / 26
页数:6
相关论文
共 50 条
  • [21] Network and hypervisor-based attacks in cloud computing environments
    Montasari, Reza
    Macdonald, Stuart
    Hosseinian-Far, Amin
    Carroll, Fiona
    Daneshkhah, Alireza
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (06) : 630 - 651
  • [22] A Survey on Hypervisor-Based Monitoring: Approaches, Applications, and Evolutions
    Bauman, Erick
    Ayoade, Gbadebo
    Lin, Zhiqiang
    ACM COMPUTING SURVEYS, 2015, 48 (01)
  • [23] HyperCrop: A Hypervisor-Based Countermeasure for Return Oriented Programming
    Jiang, Jun
    Jia, Xiaoqi
    Feng, Dengguo
    Zhang, Shengzhi
    Liu, Peng
    INFORMATION AND COMMUNICATIONS SECURITY, 2011, 7043 : 360 - +
  • [24] Preventing hypervisor-based rootkits with trusted execution technology
    Hewlett-Packard Systems Security Lab, Bristol, United Kingdom
    Netw. Secur., 2008, 11 (7-12): : 7 - 12
  • [25] HyperWallet: cryptocurrency wallet as a secure hypervisor-based application
    Zaidenberg, Nezer Jacob
    Kiperberg, Michael
    EURASIP JOURNAL ON INFORMATION SECURITY, 2024, 2024 (01):
  • [26] HyperCrypt: Hypervisor-based Encryption of Kernel and User Space
    Goetzfried, Johannes
    Doerr, Nico
    Palutke, Ralph
    Mueller, Tilo
    PROCEEDINGS OF 2016 11TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, (ARES 2016), 2016, : 79 - 87
  • [27] Laccolith: Hypervisor-Based Adversary Emulation with Anti-Detection
    Orbinato V.
    Feliciano M.C.
    Cotroneo D.
    Natella R.
    IEEE Transactions on Dependable and Secure Computing, 2024, 21 (06) : 1 - 13
  • [28] Efficient DLP-visor: An efficient hypervisor-based DLP
    Kiperberg, Michael
    Amit, Guy
    Yeshooroon, Amir
    Zaidenberg, Nezer J.
    21ST IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER, CLOUD AND INTERNET COMPUTING (CCGRID 2021), 2021, : 344 - 355
  • [30] A tiny hypervisor-based trusted geolocation framework with minimized TPM operations
    Park, Sungjin
    Won, Jong-Jin
    Yoon, Jaenam
    Kim, Kyong Hoon
    Han, Taisook
    JOURNAL OF SYSTEMS AND SOFTWARE, 2016, 122 : 202 - 214