Private execution as operating system service
Submitted by Manu Jose (@mannujose) (proposing) on Wednesday, 13 January 2016
This is a proposal requesting for someone to speak on this topic. If you’d like to speak, leave a comment.
Technical level: Beginner Status: Submitted
Private execution is similar to the private browsing mode in web browsers.
Private execution will leave no trace of the informations we used during the private execution.It enhance the privacy of user.
Privacy has become an issue of paramount importance for many users. As a result, encryption tools such as TrueCrypt, OS-based full-disk encryption such as FileVault,and privacy modes in all modern browsers have become
popular. However, although such tools are useful, they are not perfect. For example, prior work has shown that browsers still leave many traces of user information on disk even if they are started in private browsing mode. In addition, disk encryption alone is not sufficient, as key disclosure through coercion remains possible. Clearly, it would be useful and highly desirable to have OS-level support that provides strong privacy guarantees for any application – not only browsers.
P RIVEXEC provides strong, general guarantees of private execution, allowing any application to execute in a mode where storage writes, either to the filesystem or to swap, will not be recoverable by others during or after execution. P RIV E XEC does not require explicit application support, recompilation, or any other preconditions. We have implemented a prototype of P RIV E XEC by extending the Linux kernel that is performant, practical, and that secures sensitive data against disclosure.
Student in government engineering college thrissur