Towards making systems forget with machine unlearning
Today's systems produce a rapidly exploding amount of data, and the data further derives
more data, forming a complex data propagation network that we call the data's lineage …
more data, forming a complex data propagation network that we call the data's lineage …
Practical {DIFC} Enforcement on Android
Smartphone users often use private and enterprise data with untrusted third party
applications. The fundamental lack of secrecy guarantees in smartphone OSes, such as …
applications. The fundamental lack of secrecy guarantees in smartphone OSes, such as …
POSIX abstractions in modern operating systems: The old, the new, and the missing
The POSIX standard, developed 25 years ago, comprises a set of operating system (OS)
abstractions that aid application portability across UNIX-based OSes. While OSes and …
abstractions that aid application portability across UNIX-based OSes. While OSes and …
TxFS: Leveraging file-system crash consistency to provide ACID transactions
We introduce TxFS, a transactional file system that builds upon a file system's atomic-update
mechanism such as journaling. Though prior work has explored a number of transactional …
mechanism such as journaling. Though prior work has explored a number of transactional …
Simba: Tunable end-to-end data consistency for mobile apps
Developers of cloud-connected mobile apps need to ensure the consistency of application
and user data across multiple devices. Mobile apps demand different choices of distributed …
and user data across multiple devices. Mobile apps demand different choices of distributed …
Acminer: Extraction and analysis of authorization checks in android's middleware
SA Gorski, B Andow, A Nadkarni… - Proceedings of the …, 2019 - dl.acm.org
Billions of users rely on the security of the Android platform to protect phones, tablets, and
many different types of consumer electronics. While Android's permission model is well …
many different types of consumer electronics. While Android's permission model is well …
Maxoid: Transparently confining mobile applications with custom views of state
We present Maxoid, a system that allows an Android app to process its sensitive data by
securely invoking other, untrusted apps. Maxoid provides secrecy and integrity for both the …
securely invoking other, untrusted apps. Maxoid provides secrecy and integrity for both the …
Droiddisintegrator: Intra-application information flow control in android apps
E Tromer, R Schuster - Proceedings of the 11th ACM on Asia Conference …, 2016 - dl.acm.org
In mobile platforms and their app markets, controlling app permissions and preventing
abuse of private information are crucial challenges. Information Flow Control (IFC) is a …
abuse of private information are crucial challenges. Information Flow Control (IFC) is a …
Dynamic taint tracking for java with phosphor
Dynamic taint tracking is an information flow analysis that can be applied to many areas of
testing. Phosphor is the first portable, accurate and performant dynamic taint tracking system …
testing. Phosphor is the first portable, accurate and performant dynamic taint tracking system …
SADUS: Secure data deletion in user space for mobile devices
Conventional data deletion is implemented for reclaiming storage as a rapid operation.
However, the content of the deleted file still persists on the storage medium. Secure data …
However, the content of the deleted file still persists on the storage medium. Secure data …