Tamper Resistant Network Tracing
نویسندگان
چکیده
Raw network traces can be used to compromise the privacy of Internet users. For this reason, many ISPs are reluctant to collect network traces – they often regard possession of such traces as a liability. To mitigate this concern, anonymization techniques have been developed to protect user-identifying information. While most projects anonymize their traces as a post-processing step (i.e., offline), offline anonymization is insecure because raw data may still be exposed during the trace collection and anonymization steps. As an alternative, anonymization can be performed online, drastically reducing the privacy risks associated with storing raw data. Unfortunately, online anonymization is challenging in practice – data must be captured, reconstructed, analyzed, and anonymized at line speed. This paper presents a network tracing architecture that combines the performance benefits of offline anonymization with the privacy benefits of online anonymization. Our approach uses a virtual machine and an encrypted file system to protect the raw data allowing it to be securely anonymized offline. In this paper, we present our system’s design, and the implementation and evaluation of a simple prototype.
منابع مشابه
Blind Certification of Public Keys and Efficiently Revocable Cash: Secure Against Capable Attackers
Electronic cash should be revocable in order to nullify the effect of attacks mounted by a capable attacker (e.g., double spending by reverse-engineering tamper-resistant devices). For prudent engineering considerations, cash revocability forms a necessary complementary measure to using tamper-resistant devices, adding system security while lowering system cost by reducing the level of physical...
متن کاملDelayed and Controlled Failures in Tamper-Resistant Software
Tamper-resistant software (TRS) consists of two functional components: tamper detection and tamper response. Although both are equally critical to the effectiveness of a TRS system, past research has focused primarily on the former, while giving little thought to the latter. Not surprisingly, many successful breaks of commercial TRS systems found their first breaches at the relatively näıve tam...
متن کاملSecure Audit Logging with Tamper-Resistant Hardware
Secure perimeter schemes (e.g. DRM) and tracing traitor schemes (e.g. watermarking, audit logging) strive to mitigate the problems of content escaping the control of the rights holder. Secure audit logging records the user’s actions on content and enables detection of some forms of tampering with the logs. We implement Schneier and Kelsey’s secure audit logging protocol [1], strengthening the p...
متن کاملSelf authentication path insertion in FPGA-based design flow for tamper-resistant purpose
FPGA platforms have been widely used in many modern digital applications due to their low prototyping cost, short time-to-market and flexibility. Field-programmability of FPGA bitstream has made it as a flexible and easy-to-use platform. However, access to bitstream degraded the security of FPGA IPs because there is no efficient method to authenticate the originality of bitstream by the FPGA pr...
متن کاملIst-2000-25350 -shaman Deliverable Title Intermediate Specification of Security Modules Date of Delivery Document Reference Est. Person Months Security Public Nature Report
The document D08 is the intermediate report from SHAMAN WP4. The document derives the requirements for a security module (SM) from the SHAMAN scenarios describing secure heterogeneous network access, personal area networks and personal CAs. It contains a reference model which can be used as a basis for the implementation of a SM. Finally the reference model is compared with current implementati...
متن کامل