Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing
dc.contributor.author | Shu, Xiaokui | en |
dc.contributor.author | Zhang, Jing | en |
dc.contributor.author | Yao, Danfeng (Daphne) | en |
dc.contributor.author | Feng, Wu-chun | en |
dc.contributor.department | Computer Science | en |
dc.date.accessioned | 2018-07-19T16:54:23Z | en |
dc.date.available | 2018-07-19T16:54:23Z | en |
dc.date.issued | 2015-03 | en |
dc.description.abstract | The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., to detect sensitive information being stored or transmitted in the clear. However, detecting the exposure of sensitive information is challenging due to data transformation in the content. Transformations (such as insertion, deletion) result in highly unpredictable leak patterns. Existing automata-based string matching algorithms are impractical for detecting transformed data leaks, because of its formidable complexity when modeling the required regular expressions. We design two new algorithms for detecting long and transformed data leaks. Our system achieves high detection accuracy in recognizing transformed leaks compared to the state-of-the-art inspection methods. We parallelize our prototype on graphics processing unit and demonstrate the strong scalability of our detection solution required by a sizable organization. | en |
dc.identifier.doi | https://doi.org/10.1145/2699026.2699130 | en |
dc.identifier.uri | http://hdl.handle.net/10919/84195 | en |
dc.language.iso | en_US | en |
dc.publisher | ACM | en |
dc.relation.ispartof | CODASPY’15 | en |
dc.rights | In Copyright | en |
dc.rights.uri | http://rightsstatements.org/vocab/InC/1.0/ | en |
dc.subject | Data leak detection | en |
dc.subject | content inspection | en |
dc.subject | algorithm | en |
dc.subject | sampling | en |
dc.subject | alignment | en |
dc.subject | dynamic programming | en |
dc.subject | parallelism | en |
dc.title | Rapid Screening of Transformed Data Leaks with Efficient Algorithms and Parallel Computing | en |
dc.type | Conference proceeding | en |
dc.type | Presentation | en |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- ShuRapidScreening2016.pdf
- Size:
- 1.06 MB
- Format:
- Adobe Portable Document Format
- Description: