The Community for Technology Leaders
Computer Security Applications Conference, Annual (2008)
Dec. 8, 2008 to Dec. 12, 2008
ISSN: 1063-9527
ISBN: 978-0-7695-3447-3
pp: 322-331
A concern about personal information confidentiality typically arises when any desktop application communicates to the external network, for example, to its producer's server for obtaining software version updates. We address this confidentiality concern of end users by an approach called shadow execution. A key property of shadow execution is that it allows applications to successfully communicate over the network while disallowing any information leaks. We describe the design and implementation of this approach for Windows applications. Experiments with our prototype implementation indicate that shadow execution allows applications to execute without inhibiting any
Confidentiality, Information Flow, Shadow Execution, Virtual Machines, Privacy

A. P. Sistla, R. Capizzi, A. Longo and V. Venkatakrishnan, "Preventing Information Leaks through Shadow Executions," 2008 13th Asia-Pacific Computer Systems Architecture Conference (ACSAC), Hsinchu, 2008, pp. 322-331.
88 ms
(Ver 3.3 (11022016))