Understanding Data Lifetime via Whole System Simulation
نویسندگان
چکیده
Strictly limiting the lifetime (i.e. propagation and duration of exposure) of sensitive data is an important and well accepted practice in secure software development. Unfortunately, there are no current methods available for easily analyzing data lifetime in systems today, and very little information available as to the quality of today’s software with respect to data lifetime. We describe a system we have developed for analyzing sensitive data lifetime through whole system simulation called TaintBochs. TaintBochs tracks sensitive data by “tainting” it at the hardware level. Tainting information is then propagated across operating system, language, and application boundaries, permitting analysis of sensitive data handling at a whole system level. We have used TaintBochs to analyze sensitive data handling in several large, real world applications. Among these were Mozilla, Apache, and Perl, which are used to process millions of passwords, credit card numbers, etc. on a daily basis. Our investigation reveals that these applications and the components they rely upon take virtually no measures to limit the lifetime of sensitive data they handle, leaving passwords and other sensitive data scattered throughout user and kernel memory. We show how a few simple and practical changes can greatly reduce sensitive data lifetime in these appli-
منابع مشابه
Prediction Based on Type-II Censored Coherent System Lifetime Data under a Proportional Reversed Hazard Rate Model
In this paper, we discuss the prediction problem based on censored coherent system lifetime data when the system structure is known and the component lifetime follows the proportional reversed hazard model. Different point and interval predictors based on classical and Bayesian approaches are derived. A numerical example is presented to illustrate the prediction methods used in this paper. Mont...
متن کاملComputer Modeling and Simulation
Abstract. Modelling and Simulation is a discipline for developing a level of understanding of the interaction of the parts of a system, and of the system as a whole. The level of understanding which may be developed via this discipline is seldom achievable via any other discipline. A simulation is the manipulation of a model in such a way that it operates on time or space to compress it, thus e...
متن کاملAn Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks
LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...
متن کاملA New Five-Parameter Distribution: Properties and Applications
In this paper, a new five-parameter lifetime and reliability distribution named “the exponentiated Uniform-Pareto distribution (EU-PD),” has been suggested that it has a bathtub-shaped and inverse bathtub-shape for modeling lifetime data. This distribution has applications in economics, actuarial modelling, reliability modeling, lifetime and biological sciences. Firstly, the mathematical and st...
متن کاملProlonging Network Lifetime via Intra-Cluster Routing in Wireless Sensor Networks
An important challenge in wireless sensor networks (WSN) is that how to disseminate data packets from sensor nodes to base station energy efficiently. Inspiring data fusion, an outstanding feature of clustering approach, and multi-hop routing, in this paper, we propose a clustering approach called PLIR (Prolonging Network Lifetime via Intra-Cluster Routing) for saving energy and distributing da...
متن کامل