Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Solaris Zones: Operating System Support for Consolidating Commercial Workloads
LISA '04 Proceedings of the 18th USENIX conference on System administration
Listening in: practices surrounding iTunes music sharing
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A study of preferences for sharing and privacy
CHI '05 Extended Abstracts on Human Factors in Computing Systems
Virtualization of Linux Based Computers: The Linux-VServer Project
HPCS '05 Proceedings of the 19th International Symposium on High Performance Computing Systems and Applications
Face-to-Face Media Sharing Using Wireless Mobile Devices
ISM '05 Proceedings of the Seventh IEEE International Symposium on Multimedia
A feather-weight virtual machine for windows applications
Proceedings of the 2nd international conference on Virtual execution environments
Detours: binary interception of Win32 functions
WINSYM'99 Proceedings of the 3rd conference on USENIX Windows NT Symposium - Volume 3
Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems 2007
Application-level isolation and recovery with solitude
Proceedings of the 3rd ACM SIGOPS/EuroSys European Conference on Computer Systems 2008
interactions - Changing energy use through design
Yours, mine and ours? sharing and use of technology in domestic environments
UbiComp '07 Proceedings of the 9th international conference on Ubiquitous computing
Enabling pervasive mobile applications with the FM radio broadcast data system
Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications
Planet-scale human mobility measurement
Proceedings of the 2nd ACM International Workshop on Hot Topics in Planet-scale Measurement
Pairing devices for social interactions: a comparative usability evaluation
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Identifying diverse usage behaviors of smartphone apps
Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference
Defending users against smartphone apps: techniques and future directions
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
CoMon: cooperative ambience monitoring platform with continuity and benefit awareness
Proceedings of the 10th international conference on Mobile systems, applications, and services
Progressive authentication: deciding when to authenticate on mobile phones
Security'12 Proceedings of the 21st USENIX conference on Security symposium
Too much information!: user attitudes towards smartphone sharing
Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design
Hi-index | 0.00 |
Loaded with personal data, e.g. photos, contacts, and call history, mobile phones are truly personal devices. Yet it is often necessary or desirable to share our phones with others. This is especially true as mobile phones are integrating features conventionally provided by other dedicated devices, from MP3 players to games consoles. Unfortunately, when we lend our phones to others, we give away complete access because existing phones assume a single user and provide little protection for private data and applications. In this work, we present xShare, a protection solution to address this problem. xShare allows phone owners to rapidly specify what they want to share and place the phone into a restricted mode where only the data and applications intended for sharing can be accessed. We first present findings from two motivational user studies based on which we provide the design requirements of xShare. We then present the design of xShare based on file-level access control. We describe the implementation of xShare on Windows Mobile and report a comprehensive usability evaluation of the implementation, including mea-surements and user studies. The evaluation demonstrates that our xShare implementation has negligible overhead for interactive phone usage, is extremely favored by mobile users, and provides robust protection against attacks by experienced Windows Mobile users and developers.