Towards making systems forget with machine unlearning

Y Cao, J Yang - 2015 IEEE symposium on security and privacy, 2015 - ieeexplore.ieee.org
Today's systems produce a rapidly exploding amount of data, and the data further derives
more data, forming a complex data propagation network that we call the data's lineage …

Practical {DIFC} Enforcement on Android

A Nadkarni, B Andow, W Enck, S Jha - 25th USENIX Security …, 2016 - usenix.org
Smartphone users often use private and enterprise data with untrusted third party
applications. The fundamental lack of secrecy guarantees in smartphone OSes, such as …

POSIX abstractions in modern operating systems: The old, the new, and the missing

V Atlidakis, J Andrus, R Geambasu… - Proceedings of the …, 2016 - dl.acm.org
The POSIX standard, developed 25 years ago, comprises a set of operating system (OS)
abstractions that aid application portability across UNIX-based OSes. While OSes and …

TxFS: Leveraging file-system crash consistency to provide ACID transactions

Y Hu, Z Zhu, I Neal, Y Kwon, T Cheng… - ACM Transactions on …, 2019 - dl.acm.org
We introduce TxFS, a transactional file system that builds upon a file system's atomic-update
mechanism such as journaling. Though prior work has explored a number of transactional …

Simba: Tunable end-to-end data consistency for mobile apps

D Perkins, N Agrawal, A Aranya, C Yu, Y Go… - Proceedings of the …, 2015 - dl.acm.org
Developers of cloud-connected mobile apps need to ensure the consistency of application
and user data across multiple devices. Mobile apps demand different choices of distributed …

Acminer: Extraction and analysis of authorization checks in android's middleware

SA Gorski, B Andow, A Nadkarni… - Proceedings of the …, 2019 - dl.acm.org
Billions of users rely on the security of the Android platform to protect phones, tablets, and
many different types of consumer electronics. While Android's permission model is well …

Maxoid: Transparently confining mobile applications with custom views of state

Y Xu, E Witchel - Proceedings of the Tenth European Conference on …, 2015 - dl.acm.org
We present Maxoid, a system that allows an Android app to process its sensitive data by
securely invoking other, untrusted apps. Maxoid provides secrecy and integrity for both the …

Droiddisintegrator: Intra-application information flow control in android apps

E Tromer, R Schuster - Proceedings of the 11th ACM on Asia Conference …, 2016 - dl.acm.org
In mobile platforms and their app markets, controlling app permissions and preventing
abuse of private information are crucial challenges. Information Flow Control (IFC) is a …

Dynamic taint tracking for java with phosphor

J Bell, G Kaiser - Proceedings of the 2015 International Symposium on …, 2015 - dl.acm.org
Dynamic taint tracking is an information flow analysis that can be applied to many areas of
testing. Phosphor is the first portable, accurate and performant dynamic taint tracking system …

SADUS: Secure data deletion in user space for mobile devices

L Yang, T Wei, F Zhang, J Ma - computers & security, 2018 - Elsevier
Conventional data deletion is implemented for reclaiming storage as a rapid operation.
However, the content of the deleted file still persists on the storage medium. Secure data …