Mobile devices have become the platform of reference for data consumption. Between personal and work related usages, users entrust their mobile devices to handle data from different sources with different sensitivity. Unfortunately, mobile device platforms are not designed to accommodate these usages and fail to provide adequate security mechanisms to guaranty users data protection or even isolation across sources. This thesis focuses on client-oriented data protection solutions for embedded devices and more specifically smartphone-based operating systems. Three main aspects are explored. First, this thesis introduces the concept of virtual micro security perimeters, or in short data capsules, as a new primitive to track and protect user data on smartphone devices. Data capsules consist in a set of data associated to a specific provenance or to a specific device usage (e.g., work vs personal). Contrary to security through compartmentalization solutions that often provide an inflexible isolation for data or execution environments, capsules leverage information flow tracking techniques as a primitive to track and protect capsules data. This approach enables the use of any application the user might like to access data of different sensitivity while still providing strong data protection guaranties. We present an implementation and an evaluation of this approach through a prototype developed on top of the Android operating system. Second, we propose a new approach to detect sensor-based data flows via the inspection of numerical operations and their operands. This approach uses numerical operations computed values as a flow detection mechanism rather than labels or taints that are commonly used in information flow tracking systems. We evaluate our approach through the implementation of a prototype that run as a third-party application and that does not require any system changes. This solution generates a minimal computation and space overhead while not sacrificing the flow detection accuracy. Finally, we present a data protection solution for point-of-care devices that greatly reduce the trusted computing-based for data protection by using a hardware-based domain specific scrambling mechanism for point-of-care medical devices.
Subject (authority = RUETD)
Topic
Electrical and Computer Engineering
RelatedItem (type = host)
TitleInfo
Title
Rutgers University Electronic Theses and Dissertations
Identifier (type = RULIB)
ETD
Identifier
ETD_8845
PhysicalDescription
Form (authority = gmd)
electronic resource
InternetMediaType
application/pdf
InternetMediaType
text/xml
Extent
1 online resource (xi, 122 p. : ill.)
Note (type = degree)
Ph.D.
Note (type = bibliography)
Includes bibliographical references
Subject (authority = ETD-LCSH)
Topic
Computer security
Subject (authority = ETD-LCSH)
Topic
Data protection
Note (type = statement of responsibility)
by Gabriel Salles-Loustau
RelatedItem (type = host)
TitleInfo
Title
School of Graduate Studies Electronic Theses and Dissertations
Identifier (type = local)
rucore10001600001
Location
PhysicalLocation (authority = marcorg); (displayLabel = Rutgers, The State University of New Jersey)
I hereby grant to the Rutgers University Libraries and to my school the non-exclusive right to archive, reproduce and distribute my thesis or dissertation, in whole or in part, and/or my abstract, in whole or in part, in and from an electronic format, subject to the release date subsequently stipulated in this submittal form and approved by my school. I represent and stipulate that the thesis or dissertation and its abstract are my original work, that they do not infringe or violate any rights of others, and that I make these grants as the sole owner of the rights to my thesis or dissertation and its abstract. I represent that I have obtained written permissions, when necessary, from the owner(s) of each third party copyrighted matter to be included in my thesis or dissertation and will supply copies of such upon request by my school. I acknowledge that RU ETD and my school will not distribute my thesis or dissertation or its abstract if, in their reasonable judgment, they believe all such rights have not been secured. I acknowledge that I retain ownership rights to the copyright of my work. I also retain the right to use all or part of this thesis or dissertation in future works, such as articles or books.