Understanding Data Lifetime via Whole System Simulation

نویسندگان

  • Jim Chow
  • Ben Pfaff
  • Tal Garfinkel
  • Kevin Christopher
  • Mendel Rosenblum
چکیده

Strictly limiting the lifetime (i.e. propagation and duration of exposure) of sensitive data is an important and well accepted practice in secure software development. Unfortunately, there are no current methods available for easily analyzing data lifetime in systems today, and very little information available as to the quality of today’s software with respect to data lifetime. We describe a system we have developed for analyzing sensitive data lifetime through whole system simulation called TaintBochs. TaintBochs tracks sensitive data by “tainting” it at the hardware level. Tainting information is then propagated across operating system, language, and application boundaries, permitting analysis of sensitive data handling at a whole system level. We have used TaintBochs to analyze sensitive data handling in several large, real world applications. Among these were Mozilla, Apache, and Perl, which are used to process millions of passwords, credit card numbers, etc. on a daily basis. Our investigation reveals that these applications and the components they rely upon take virtually no measures to limit the lifetime of sensitive data they handle, leaving passwords and other sensitive data scattered throughout user and kernel memory. We show how a few simple and practical changes can greatly reduce sensitive data lifetime in these appli-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Prediction Based on Type-II Censored Coherent System Lifetime Data under a Proportional Reversed Hazard Rate Model

In this paper, we discuss the prediction problem based on censored coherent system lifetime data when the system structure is known and the component lifetime follows the proportional reversed hazard model. Different point and interval predictors based on classical and Bayesian approaches are derived. A numerical example is presented to illustrate the prediction methods used in this paper. Mont...

متن کامل

Computer Modeling and Simulation

Abstract. Modelling and Simulation is a discipline for developing a level of understanding of the interaction of the parts of a system, and of the system as a whole. The level of understanding which may be developed via this discipline is seldom achievable via any other discipline. A simulation is the manipulation of a model in such a way that it operates on time or space to compress it, thus e...

متن کامل

An Adaptive LEACH-based Clustering Algorithm for Wireless Sensor Networks

LEACH is the most popular clastering algorithm in Wireless Sensor Networks (WSNs). However, it has two main drawbacks, including random selection of cluster heads, and direct communication of cluster heads with the sink. This paper aims to introduce a new centralized cluster-based routing protocol named LEACH-AEC (LEACH with Adaptive Energy Consumption), which guarantees to generate balanced cl...

متن کامل

A New Five-Parameter Distribution: Properties and Applications

In this paper, a new five-parameter lifetime and reliability distribution named “the exponentiated Uniform-Pareto distribution (EU-PD),” has been suggested that it has a bathtub-shaped and inverse bathtub-shape for modeling lifetime data. This distribution has applications in economics, actuarial modelling, reliability modeling, lifetime and biological sciences. Firstly, the mathematical and st...

متن کامل

Prolonging Network Lifetime via Intra-Cluster Routing in Wireless Sensor Networks

An important challenge in wireless sensor networks (WSN) is that how to disseminate data packets from sensor nodes to base station energy efficiently. Inspiring data fusion, an outstanding feature of clustering approach, and multi-hop routing, in this paper, we propose a clustering approach called PLIR (Prolonging Network Lifetime via Intra-Cluster Routing) for saving energy and distributing da...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004