POSTER–TRIPLEX: Verifying Data Minimisation in Communication Systems
نویسندگان
چکیده
Systems dealing with personal information are legally required to satisfy the principle of data minimisation. Privacy-enhancing protocols use cryptographic primitives to minimise the amount of personal information exposed by communication. However, the complexity of these primitives and their interplay makes it hard for noncryptography experts to understand the privacy implications of their use. In this demo, we present TRIPLEX, a framework for the analysis of data minimisation in privacy-enhancing protocols.
منابع مشابه
ساختار مولکول DNA سه رشته ای: اهمیت و کاربردهای پزشکی آن
Back in 1957, when investigators produced a triple-stranded form of DNA while studying synthetic nucleic acids, few researchers paid much attention to the discovery. However, triplex DNA was never entirely forgotton and especially since 1987 its structural and functional importance in biological systems as well as its medical applications and therapeutic potentional have been extensively studie...
متن کاملFinite-Horizon Bisimulation Minimisation for Probabilistic Systems
We present model reduction techniques to improve the efficiency and scalability of verifying probabilistic systems over a finite time horizon. We propose a finite-horizon variant of probabilistic bisimulation for discrete-time Markov chains, which preserves a bounded fragment of the temporal logic PCTL. In addition to a standard partitionrefinement based minimisation algorithm, we present on-th...
متن کاملHigh-Speed Data Dissemination over Device-to-Device Millimeter-Wave Networks for Highway Vehicular Communication
Gigabit-per-second connectivity among vehicles is expected to be a key enabling technology for sensor information sharing, in turn, resulting in safer Intelligent Transportation Systems (ITSs). Recently proposed millimeter-wave (mmWave) systems appear to be the only solution capable of meeting the data rate demand imposed by future ITS services. In this poster, we assess the performance of a mm...
متن کاملPoster: Fast Object Identification for Kernel Data Anomaly Detection
As recent adversaries turned their eyes to attacking a system through non-control kernel data, in order to ensure the integrity of the kernel, the need arose for verifying noncontrol kernel data. This complicates typical security measures relying on integrity specifications set by security administrators, as it is non-trivial to manually encompass specifications for noncontrol kernel data. Fore...
متن کاملPoster: Android Collusive Data Leaks with Flow-sensitive DIALDroid Dataset
We present DIALDroid, a scalable and accurate tool for analyzing inter-app Inter-Component Communication (ICC) among Android apps, which outperforms current stateof-the-art ICC analysis tools. Using DIALDroid, we performed the first large-scale detection of collusive and vulnerable apps based on inter-app ICC data flows among 110,150 real-world apps and identified key security insights.
متن کامل