当前位置: X-MOL 学术IEEE Micro › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Trace Wringing for Program Trace Privacy
IEEE Micro ( IF 2.8 ) Pub Date : 2020-01-01 , DOI: 10.1109/mm.2020.2986113
Deeksha Dangwal 1 , Weilong Cui 2 , Joseph McMahan 3 , Timothy Sherwood 1
Affiliation  

A quantitative approach to optimizing computer systems requires a good understanding of how applications exercise a machine, and real program traces from production environments lead to the clearest understanding. Unfortunately, even the simplest program traces can leak sensitive details about users, their recent activity, or even details of trade secret algorithms. Given the cleverness of attackers working to undo well-intentioned, but ultimately insufficient, anonymization techniques, many organizations have simply decided to cease making traces available. Trace wringing is a new formulation of the problem of sharing traces where one knows a priori how much information the trace is leaking in the worst case. The key idea is to squeeze as much information as possible out of the trace without completely compromising its usefulness for optimization. We demonstrate the utility of a wrung trace through cache simulation and examine the sensitivity of wrung traces to a class of attacks on Advanced Encryption Standard (AES) encryption.

中文翻译:

程序跟踪隐私的跟踪绞杀

优化计算机系统的量化方法需要很好地理解应用程序如何运行机器,并且来自生产环境的真实程序跟踪导致最清晰的理解。不幸的是,即使是最简单的程序跟踪也可能泄露有关用户的敏感细节、他们最近的活动,甚至商业秘密算法的细节。考虑到攻击者巧妙地撤消了善意但最终不充分的匿名技术,许多组织只是决定停止提供痕迹。踪迹扭曲是共享踪迹问题的一种新表述,在这种情况下,人们先验地知道在最坏的情况下踪迹泄漏了多少信息。关键思想是在不完全损害其优化有用性的情况下,从跟踪中挤出尽可能多的信息。
更新日期:2020-01-01
down
wechat
bug