메뉴 건너뛰기




Volumn , Issue , 2012, Pages 61-75

Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER OPERATING SYSTEMS;

EID: 84977840356     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (45)

References (60)
  • 2
    • 85084163253 scopus 로고    scopus 로고
    • Secure data deletion for Linux file systems
    • S. Bauer and N. Priyantha. Secure data deletion for Linux file systems. In USENIX Security, 2001.
    • (2001) USENIX Security
    • Bauer, S.1    Priyantha, N.2
  • 3
    • 85076914568 scopus 로고
    • A cryptographic file system for UNIX
    • M. Blaze. A cryptographic file system for UNIX. In CCS, 1994.
    • (1994) CCS
    • Blaze, M.1
  • 5
    • 84870682965 scopus 로고    scopus 로고
    • Protecting confidential data on personal computers with storage capsules
    • K. Borders, E. V. Weele, B. Lau, and A. Prakash. Protecting confidential data on personal computers with storage capsules. In USENIX Security, 2009.
    • (2009) USENIX Security
    • Borders, K.1    Weele, E.V.2    Lau, B.3    Prakash, A.4
  • 6
    • 1442263220 scopus 로고    scopus 로고
    • Scrash: A system for generating secure crash information
    • P. Broadwell, M. Harren, and N. Sastry. Scrash: A system for generating secure crash information. In USENIX Security, 2003.
    • (2003) USENIX Security
    • Broadwell, P.1    Harren, M.2    Sastry, N.3
  • 8
    • 84889030419 scopus 로고    scopus 로고
    • Shredding your garbage: Reducing data lifetime through secure deallocation
    • J. Chow, B. Pfaff, T. Garfinkel, and M. Rosenblum. Shredding your garbage: Reducing data lifetime through secure deallocation. In USENIX Security, 2005.
    • (2005) USENIX Security
    • Chow, J.1    Pfaff, B.2    Garfinkel, T.3    Rosenblum, M.4
  • 10
    • 85076896624 scopus 로고    scopus 로고
    • Zero-interaction authentication
    • M. Corner and B. Noble. Zero-interaction authentication. In MOBICOM, 2004.
    • (2004) MOBICOM
    • Corner, M.1    Noble, B.2
  • 11
  • 12
    • 84947196743 scopus 로고    scopus 로고
    • Defeating encrypted and deniable file systems: TrueCrypt v5.1a and the case of the tattling OS and applications
    • A. Czeskis, D. J. S. Hilaire, K. Koscher, S. D. Gribble, T. Kohno, and B. Schneier. Defeating encrypted and deniable file systems: TrueCrypt v5.1a and the case of the tattling OS and applications. In HotSec, 2008.
    • (2008) HotSec
    • Czeskis, A.1    Hilaire, D.J.S.2    Koscher, K.3    Gribble, S.D.4    Kohno, T.5    Schneier, B.6
  • 14
    • 85076887758 scopus 로고    scopus 로고
    • eCryptfs. https://launchpad.net/ecryptfs.
  • 18
    • 85063439754 scopus 로고    scopus 로고
    • Deniable cloud storage: Sharing files via public-key deniability
    • P. Gasti, G. Ateniese, and M. Blanton. Deniable cloud storage: Sharing files via public-key deniability. In WPES, 2010.
    • (2010) WPES
    • Gasti, P.1    Ateniese, G.2    Blanton, M.3
  • 19
    • 0004610703 scopus 로고    scopus 로고
    • Secure deletion of data from magnetic and solid-state memory
    • P. Gutmann. Secure deletion of data from magnetic and solid-state memory. In USENIX Security, 1996.
    • (1996) USENIX Security
    • Gutmann, P.1
  • 20
    • 85084163443 scopus 로고    scopus 로고
    • Data remanence in semiconductor devices
    • P. Gutmann. Data remanence in semiconductor devices. In USENIX Security, 2001.
    • (2001) USENIX Security
    • Gutmann, P.1
  • 22
    • 36049035340 scopus 로고    scopus 로고
    • Protecting cryptographic keys from memory disclosure attacks
    • K. Harrison and S. Xu. Protecting cryptographic keys from memory disclosure attacks. In DSN, 2007.
    • (2007) DSN
    • Harrison, K.1    Xu, S.2
  • 24
    • 84979668035 scopus 로고    scopus 로고
    • Making programs forget: Enforcing lifetime for sensitive data
    • J. Kannan, G. Altekar, P. Maniatis, and B.-G. Chun. Making programs forget: Enforcing lifetime for sensitive data. In HotOS, 2011.
    • (2011) HotOS
    • Kannan, J.1    Altekar, G.2    Maniatis, P.3    Chun, B.-G.4
  • 26
    • 77954969841 scopus 로고    scopus 로고
    • Nohype: Virtualized cloud infrastructure without the virtualization
    • E. Keller, J. Szefer, J. Rexford, and R. B. Lee. NoHype: Virtualized cloud infrastructure without the virtualization. In ISCA, 2010.
    • (2010) ISCA
    • Keller, E.1    Szefer, J.2    Rexford, J.3    Lee, R.B.4
  • 27
    • 77956335911 scopus 로고    scopus 로고
    • Usable security: How to get it
    • Nov
    • B. Lampson. Usable security: How to get it. Communications of the ACM, 52(11), Nov. 2009.
    • (2009) Communications of the ACM , vol.52 , Issue.11
    • Lampson, B.1
  • 31
    • 84888986199 scopus 로고    scopus 로고
    • Do you know where your data are? Secure data capsules for deployable data protection
    • P. Maniatis, D. Akhawe, K. Fall, E. Shi, S. McCamant, and D. Song. Do you know where your data are? Secure data capsules for deployable data protection. In HotOS, 2011.
    • (2011) HotOS
    • Maniatis, P.1    Akhawe, D.2    Fall, K.3    Shi, E.4    McCamant, S.5    Song, D.6
  • 32
    • 80755187832 scopus 로고    scopus 로고
    • Unicorn: Two-factor attestation for data security
    • M. Mannan, B. H. Kim, A. Ganjali, and D. Lie. Unicorn: Two-factor attestation for data security. In CCS, 2011.
    • (2011) CCS
    • Mannan, M.1    Kim, B.H.2    Ganjali, A.3    Lie, D.4
  • 33
    • 34748840535 scopus 로고    scopus 로고
    • STEGFs: A steganographic file system for Linux
    • A. McDonald and M. Kuhn. StegFS: A steganographic file system for Linux. In IH, 1999.
    • (1999) IH
    • McDonald, A.1    Kuhn, M.2
  • 36
    • 0345359164 scopus 로고    scopus 로고
    • STEGFs: A steganographic file system
    • H. Pang, K.-L. Tan, and X. Zhou. StegFS: A steganographic file system. In ICDE, 2003.
    • (2003) ICDE
    • Pang, H.1    Tan, K.-L.2    Zhou, X.3
  • 42
    • 85084160194 scopus 로고    scopus 로고
    • Encrypting virtual memory
    • N. Provos. Encrypting virtual memory. In USENIX Security, 2000.
    • (2000) USENIX Security
    • Provos, N.1
  • 43
    • 85076916746 scopus 로고    scopus 로고
    • Qubes. http://qubes-os.org/.
  • 44
    • 85073529809 scopus 로고    scopus 로고
    • Data node encrypted file system: Efficient secure deletion for flash memory
    • J. Reardon, S. Capkun, and D. Basin. Data node encrypted file system: Efficient secure deletion for flash memory. In USENIX Security, 2012.
    • (2012) USENIX Security
    • Reardon, J.1    Capkun, S.2    Basin, D.3
  • 46
    • 35448997405 scopus 로고    scopus 로고
    • Threats to privacy in the forensic analysis of database systems
    • P. Stahlberg, G. Miklau, and B. Levine. Threats to privacy in the forensic analysis of database systems. In SIGMOD, 2007.
    • (2007) SIGMOD
    • Stahlberg, P.1    Miklau, G.2    Levine, B.3
  • 47
    • 84904654800 scopus 로고    scopus 로고
    • SecureSwitch: BIOS-assisted isolation and switch between trusted and untrusted commodity OSes
    • K. Sun, J. Wang, F. Zhang, and A. Stavrou. SecureSwitch: BIOS-assisted isolation and switch between trusted and untrusted commodity OSes. In NDSS, 2012.
    • (2012) NDSS
    • Sun, K.1    Wang, J.2    Zhang, F.3    Stavrou, A.4
  • 50
    • 80755169480 scopus 로고    scopus 로고
    • Eliminating the hypervisor attack surface for a more secure cloud
    • J. Szefer, E. Keller, R. B. Lee, and J. Rexford. Eliminating the hypervisor attack surface for a more secure cloud. In CCS, 2011.
    • (2011) CCS
    • Szefer, J.1    Keller, E.2    Lee, R.B.3    Rexford, J.4
  • 51
    • 84857516359 scopus 로고    scopus 로고
    • Trust and protection in the Illinois browser operating system
    • S. Tang, H. Mai, and S. T. King. Trust and protection in the Illinois browser operating system. In OSDI, 2010.
    • (2010) OSDI
    • Tang, S.1    Mai, H.2    King, S.T.3
  • 53
    • 85076883014 scopus 로고    scopus 로고
    • Tor. http://www.torproject.org.
  • 54
    • 85076929332 scopus 로고    scopus 로고
    • Retrieved on 5/3/12
    • SwapFaq. https://help.ubuntu.com/community/ SwapFaq. Retrieved on 5/3/12.
    • SwapFaq
  • 57
    • 85021672500 scopus 로고    scopus 로고
    • Reliably erasing data from flash-based solid state drives
    • M. Wei, L. Grupp, F. Spada, and S. Swanson. Reliably erasing data from flash-based solid state drives. In FAST, 2011.
    • (2011) FAST
    • Wei, M.1    Grupp, L.2    Spada, F.3    Swanson, S.4
  • 59
    • 84991934426 scopus 로고    scopus 로고
    • Tightlip: Keeping applications from spilling the beans
    • A. R. Yumerefendi, B. Mickle, and L. P. Cox. TightLip: Keeping applications from spilling the beans. In NSDI, 2007.
    • (2007) NSDI
    • Yumerefendi, A.R.1    Mickle, B.2    Cox, L.P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.