Learn More
A concern about personal information confidentiality typically arises when any desktop application communicates to the external network, for example, to its pro-ducer's server for obtaining software version updates. We address this confidentiality concern of end users by an approach called shadow execution. A key property of shadow execution is that it(More)
  • 1