Safer Program Behavior Sharing through Trace Wringing

5Citations
Citations of this article
19Readers
Mendeley users who have this article in their library.

Abstract

When working towards application-tuned systems, developers often find themselves caught between the need to share information (so that partners can make intelligent design choices) and the need to hide information (to protect proprietary methods or sensitive data). One place where this problem comes to a head is in the release of program traces, for example a memory address trace. A trace taken from a production server might expose details about who the users are or what they are doing, or it might even expose details of the actual computation itself (e.g. through a side channel). Engineers are often asked to make, by hand, "analogs" of their codes that would be free from such sensitive data or, may even try to describe behaviors at a high level with words. Both of these approaches lead to missed opportunities, confusion, and frustration.We propose a new problem for study, trace-wringing, that seeks to remove as much information from the trace as possible while still maintaining key characteristics of the original. We formalize this problem and show that, for a specific instance around memory traces, as little as a few thousand bits need to be shared. We demonstrate experimentally that the trace-wrung proxies behave similarly in the context of cache simulation but with bounded leakage, and examine the sensitivity of wrung traces to a class of attacks on AES encryption.

Cite

CITATION STYLE

APA

Dangwal, D., Cui, W., McMahan, J., & Sherwood, T. (2019). Safer Program Behavior Sharing through Trace Wringing. In International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS (pp. 1059–1072). Association for Computing Machinery. https://doi.org/10.1145/3297858.3304074

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free