LLSS: Toward System Support for Plugging Privacy Leaks

Slides:



Advertisements
Similar presentations
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval Prateek Mittal University of Illinois Urbana-Champaign Joint work with: Femi.
Advertisements

Trust, Security and Privacy in Learning Networks Daniel Olmedilla L3S Research Center / Hannover University Learning Networks in Practice 10 th May, 2007.
SECURITY CHECK Protecting Your System and Yourself Source:
Automatic for the people: Reducing inadvertent leaks by personal machines Landon Cox Duke University.
Daniela Oliveira 1, Dhiraj Murthy 1, Henric Johnson 2, S. Felix Wu 3, Roozbeh Nia 3 and Jeff Rowe 3 1 Bowdoin College 2 Blekinge Institute of Technology.
Introduction to Your Name Goes Here
Part 3: Design Days 15, 19, 21, 23 Chapter 8: Work Reengineering and Conceptual Design Chapter 9: Design Guidance and Design Rationale Chapter 10: Interaction.
Software Creates Privacy Mode to Help Secure Android Phones Author: Matt Shipman Researcher: Dr. Xuxian Jiang Presenter: Brett Shofner.
The Internet. Telnet Telnet means using your computer as a terminal. All commands you type are sent to the host computer you are connected to and executed.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
Privacy Issues and Techniques for Monitoring Applications Vibhor Rastogi RFID Security Group.
Sarah Showalter Summer Utilizing the school computers, network, and storage space is a privilege! Each year all users are expected to review.
1 Towards an end-to-end architecture for handling sensitive data Hector Garcia-Molina Rajeev Motwani and students.
Cumulus vs. Portfolio: An interactivity slam-down between two Digital Asset Management Applications Theories and Practice of Interactive Media 7 December.
P2P File Sharing Systems
©2003 CNET Networks, Inc. All rights reserved. Virus Basics Created by: Robert L. Bogue, MCSE: Security, etc. Crowe Chizek.
OCR Nationals – Unit 1 AO2 (Part 2) – s. Overview of AO2 (Part 2) To select and use tools and facilities to download files/information and to send.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
Confidential Confidential Rev PA11 Access to local device functionality through REST APIs Johan Apelqvist Research Manager R&T Advanced Concepts.
TRUST NEGOTIATION IN ONLINE BUSINESS TRANSACTIONS BY CHANDRAKANTH REDDY.
Usability Evaluation Yogi
 Two types of malware propagating through social networks, Cross Site Scripting (XSS) and Koobface worm.  How these two types of malware are propagated.
OSG Security Kevin Hill. Goals Operational Security – Identify software vulnerabilities – observing the practices of our VOs and sites, and sending alerts.
Desktop computer security policies Applies to ALL computers connecting to the PathStone network irrespective of device ownership.
Nathaniel S. Good Aaron Krekelberg Usability and privacy: a study of Kazaa P2P file- sharing.
Security System Ability of a system to protect information and system resources with respect to confidentiality and integrity.
Refine Produce Implement Design and Development Stages.
Pedigree: Network-wide Protection Against Enterprise Data Leaks Team: Nick Feamster, Assistant Professor, School of CS Anirudh Ramachandran, PhD candidate,
(a) What is the output generated by this program? In fact the output is not uniquely defined, i.e., it is not always the same. So please give three examples.
“Taking care of myself while surfing the Internet” Children’s Experiences & eSafety Rules.
From Fair Use to Fair Trading Creating a Digital Image Matchmaking Commons Collaborative collection building and sharing using MDID.
1.1 1 Purpose of firewall : –Control access to or from a protected network; –Implements network access policy connections pass through firewall and are.
11 Version Control Systems Mauro Jaskelioff (originally by Gail Hopkins)
University of British Columbia Towards Web 2.0 Content Sharing Beyond Walled Gardens San-Tsai Sun Supervisor: Kosta Beznosov Laboratory for Education and.
SoftwarePot: A Secure Software Circulation System Yoshihiro OYAMA (Univ. of Tokyo / JST) Kazuhiko KATO (Univ. of Tsukuba / JST)
Protecting Your Computer By: Victoria Tuttle. There’s never enough you can do to protect your computer.
6° of Darkness or Using Webs of Trust to Solve the Problem of Global Indexes.
Transition to Practice. We define “Transition to Practice” as making privacy tools and systems operational.
Security Issues and Challenges in High Performance Grid Computing SASA SUBOTIC SASA SUBOTIC University of Pretoria.
Observation vs. Inferences The Local Environment.
Writing an message Finish off your slide on recommendations of how to write an .
Elluminate’s Integration to Blackboard Introducing Building Block Version 2.
Billy Ripple Dr. Oblitey COSC  File-Sharing ◦ What is it? ◦ Uses ◦ History ◦ Types ◦ Dangers  Case Study  Summary  Works Cited.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
. Electronic. is a method of exchanging digital messages. What does the E in stand for?
If we don’t subnet and use as our subnet mask then we use all of our IP addresses on one network. This is not an efficient use of our Class.
New OSG Virtual Organization Security Training OSG Security Team.
What it is and how to stop it.  What spam is.  Why it can be dangerous.  How to handle it.
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
CPS110: General security Landon Cox April 1, 2008.
OSG Security Kevin Hill.
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime Sadiq Basha.
File Sharing Legalities and Ethics
Introduction to Your Name Goes Here
Staying Austin College
Quicken capital one download error
مبررات إدخال الحاسوب في رياض الأطفال
تحليل الحساسية Sensitive Analysis.
Stay Safe While Using The Internet
Introduction to Your Name Goes Here
Good User Experience is a pinnacle point of your customer’s online experience. Only by testing your website’s usability will you understand how real Australian.
Induction and deduction are used together in research reasoning
1 Let’s Get This File On The Internet ( /mb)
21twelveinteractive.com/ twitter.com/21twelveI/ facebook.com/21twelveinteractive/ linkedin.com/company/21twelve-interactive/ pinterest.com/21twelveinteractive/
An Experimental Study of the Potential of Using Small
Social Navigation as a Model for Usable Security
Quick Start Guide   Installation GM Pro 7.4 5/10/2019.
Refine Produce Implement
Presentation transcript:

LLSS: Toward System Support for Plugging Privacy Leaks

Privacy leak scenario Alice Bob Despite Alice’s best efforts, Bob’s best intentions, and no system compromises ...

Frighteningly plausible “Usability and privacy: a study of Kazaa…” Good and Krekelberg, SigCHI 2003 In 12 hours, found 150 inboxes on Kazaa Observed people downloading them Problem People don’t understand software interactions LLSS [“Loose Lips Sink Ships”]

LLSS approach Ask users What and Who, not How Help users define system meta-data Find sensitive files (email, ssn, cc numbers) Infer other trusted hosts Use meta-data to identify potential leaks Interpose on file system and socket syscalls Use speculative execution to detect leaks

Questions?