Kells: A protection framework for portable data

Kevin R.B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

Abstract

Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open computer laboratories, Internet cafes, and on office and home computers. Consequently, they are the target of malware that exploit the data present or use them as a means to propagate malicious software. This paper presents the Kells mobile storage system. Kells limits untrusted or unknown systems from accessing sensitive data by continuously validating the accessing host's integrity state. We explore the design and operation of Kells, and implement a proof-of-concept USB 2.0 storage device on experimental hardware. Our analysis of Kells is twofold. We first prove the security of device operation (within a freshness security parameter Δt) using the LS2 logic of secure systems. Second, we empirically evaluate the performance of Kells. These experiments indicate nominal overheads associated with host validation, showing a worst case throughput overhead of 1.22% for read operations and 2.78% for writes.

Original languageEnglish (US)
Title of host publicationProceedings - 26th Annual Computer Security Applications Conference, ACSAC 2010
Pages231-240
Number of pages10
DOIs
StatePublished - Dec 1 2010
Event26th Annual Computer Security Applications Conference, ACSAC 2010 - Austin, TX, United States
Duration: Dec 6 2010Dec 10 2010

Publication series

NameProceedings - Annual Computer Security Applications Conference, ACSAC
ISSN (Print)1063-9527

Other

Other26th Annual Computer Security Applications Conference, ACSAC 2010
CountryUnited States
CityAustin, TX
Period12/6/1012/10/10

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Software
  • Safety, Risk, Reliability and Quality

Fingerprint Dive into the research topics of 'Kells: A protection framework for portable data'. Together they form a unique fingerprint.

  • Cite this

    Butler, K. R. B., McLaughlin, S. E., & McDaniel, P. D. (2010). Kells: A protection framework for portable data. In Proceedings - 26th Annual Computer Security Applications Conference, ACSAC 2010 (pp. 231-240). (Proceedings - Annual Computer Security Applications Conference, ACSAC). https://doi.org/10.1145/1920261.1920296