A Hypervisor-Based Privacy Agent for Mobile and IoT Systems

被引:6
作者
Klingensmith, Neil [1 ]
Kim, Younghyun [1 ]
Banerjee, Suman [2 ]
机构
[1] Univ Wisconsin, Elect & Comp Engn, Madison, WI 53706 USA
[2] Univ Wisconsin, Comp Sci, Madison, WI 53706 USA
来源
HOTMOBILE '19 - PROCEEDINGS OF THE 20TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS | 2019年
基金
美国国家科学基金会;
关键词
Privacy; Mobile Systems; IoT; Hypervisors; Real-time;
D O I
10.1145/3301293.3302356
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a design for a mobile and IoT data privacy agent that lives in software on end devices. Our privacy agent learns and enforces a user's privacy policy across all devices that he manages. Implemented as a hypervisor onboard the end device, our privacy agent sits between the device's hardware and its application software. It can inspect, modify, block, and inject I/O traffic between the device's main CPU and its peripherals. The key advantage of our architecture is that, unlike network middleboxes, the hypervisor can track all I/O transactions in unencrypted form. This makes our privacy agent potentially much more effective than those that only monitor network traffic because it can track and modify plaintext data. Our privacy agent also gives users the ability to impose a uniform privacy policy across all devices that they manage, which minimizes the burden and possibility of error that arise when setting privacy policy on individual devices. Since the notion of per-user (as opposed to per-app) privacy policy is relatively new, there has not been much opportunity for researchers to think about how to define and implement policy on that scale. We propose a method for learning a user's privacy policy one time and automatically implementing it in a context-aware fashion on multiple devices.
引用
收藏
页码:21 / 26
页数:6
相关论文
共 9 条
  • [1] Angel S, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P397
  • [2] [Anonymous], 2015, Black Hat USA
  • [3] Building accountability into the Internet of Things: the IoT Databox model
    Crabtree A.
    Lodge T.
    Colley J.
    Greenhalgh C.
    Glover K.
    Haddadi H.
    Amar Y.
    Mortier R.
    Li Q.
    Moore J.
    Wang L.
    Yadav P.
    Zhao J.
    Brown A.
    Urquhart L.
    McAuley D.
    [J]. Journal of Reliable Intelligent Environments, 2018, 4 (1) : 39 - 55
  • [4] Privacy Mediators: Helping IoT Cross the Chasm
    Davies, Nigel
    Taft, Nina
    Satyanarayanan, Mahadev
    Clinch, Sarah
    Amos, Brandon
    [J]. HOTMOBILE'16: PROCEEDINGS OF THE 17TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS AND APPLICATIONS, 2016, : 39 - 44
  • [5] Enck William., 2010, Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI), P393
  • [6] Hermes: A Real Time Hypervisor for Mobile and IoT Systems
    Klingensmith, Neil
    Banerjee, Suman
    [J]. HOTMOBILE'18: PROCEEDINGS OF THE 19TH INTERNATIONAL WORKSHOP ON MOBILE COMPUTING SYSTEMS & APPLICATIONS, 2018, : 101 - 106
  • [7] Sridhar A, 2016, INTERSOC C THERMAL T, P337, DOI 10.1109/ITHERM.2016.7517568
  • [8] Contextualizing Privacy Decisions for Better Prediction (and Protection)
    Wijesekera, Primal
    Reardon, Joel
    Reyes, Irwin
    Tsai, Lynn
    Chen, Jung-Wei
    Good, Nathan
    Wagner, David
    Beznosov, Konstantin
    Egelman, Serge
    [J]. PROCEEDINGS OF THE 2018 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI 2018), 2018,
  • [9] Yin H, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P116