TY - GEN
T1 - Protecting portable storage with host validation
AU - Butler, Kevin
AU - McLaughlin, Stephen
AU - McDaniel, Patrick
PY - 2010
Y1 - 2010
N2 - Portable storage devices, such as key-chain USB devices, are ubiquitous and used everywhere; users repeatedly use the same storage device in open computer laboratories, Internet cafes, and on office and home computers. Consequently, they are the target of malware that exploit the data present or use them as a means to propagate malicious software.We present the Kells mobile storage system, which limits untrusted or unknown systems from accessing sensitive data by continuously validating the accessing host's integrity state. We explore the design and operation of Kells, and implement a proof-of-concept USB 2.0 storage device on experimental hardware. Our experiments indicate nominal overheads associated with host validation, with a worst-case throughput overhead of 1.22% for reads and 2.78% for writes.
AB - Portable storage devices, such as key-chain USB devices, are ubiquitous and used everywhere; users repeatedly use the same storage device in open computer laboratories, Internet cafes, and on office and home computers. Consequently, they are the target of malware that exploit the data present or use them as a means to propagate malicious software.We present the Kells mobile storage system, which limits untrusted or unknown systems from accessing sensitive data by continuously validating the accessing host's integrity state. We explore the design and operation of Kells, and implement a proof-of-concept USB 2.0 storage device on experimental hardware. Our experiments indicate nominal overheads associated with host validation, with a worst-case throughput overhead of 1.22% for reads and 2.78% for writes.
UR - http://www.scopus.com/inward/record.url?scp=78650030843&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=78650030843&partnerID=8YFLogxK
U2 - 10.1145/1866307.1866386
DO - 10.1145/1866307.1866386
M3 - Conference contribution
AN - SCOPUS:78650030843
SN - 9781450302449
T3 - Proceedings of the ACM Conference on Computer and Communications Security
SP - 651
EP - 653
BT - CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security
T2 - 17th ACM Conference on Computer and Communications Security, CCS'10
Y2 - 4 October 2010 through 8 October 2010
ER -