usenix conference policies
Context-centric Security
Mohit Tiwari, Prashanth Mohan, Andrew Osheroff, and Hilfi Alkaff, University of California, Berkeley; Elaine Shi, University of Maryland, College Park; Eric Love, Dawn Song, and Krste Asanović, University of California, Berkeley
Users today are unable to use the rich collection of third-party untrusted applications without risking significant privacy leaks. In this paper, we argue that current and proposed applications and data-centric security policies do not map well to users’ expectations of privacy. In the eyes of a user, applications and peripheral devices exist merely to provide functionality and should have no place in controlling privacy. Moreover, most users cannot handle intricate security policies dealing with system concepts such as labeling of data, application permissions and virtual machines. Not only are current policies impenetrable to most users, they also lead to security problems such as privilege-escalation attacks and implicit information leaks.
Our key insight is that users naturally associate data with real-world events, and want to control access at the level of human contacts. We introduce Bubbles, a context-centric security system that explicitly captures user’s privacy desires by allowing human contact lists to control access to data clustered by real-world events. Bubbles infers information-flow rules from these simple context-centric access-control rules to enable secure use of untrusted applications on users’ data.
We also introduce a new programming model for untrusted applications that allows them to be functional while still upholding the users’ privacy policies. We evaluate the model’s usability by porting an existing medical application and writing a calendar app from scratch. Finally, we show the design of our system prototype running on Android that uses bubbles to automatically infer all dangerous permissions without any user intervention. Bubbles prevents Android-style permission escalation attacks without requiring users to specify complex information flow rules.
Open Access Media
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.
title = {Context-centric Security},
booktitle = {7th USENIX Workshop on Hot Topics in Security (HotSec 12)},
year = {2012},
address = {Bellevue, WA},
url = {https://www.usenix.org/conference/hotsec12/workshop-program/presentation/tiwari},
publisher = {USENIX Association},
month = aug
}
connect with us