Abstract Computer applications often leave traces or residues that enable forensic examiners to gain a detailed understanding of the actions a user performed on a computer. Such digital breadcrumbs are left by a large variety of applications, potentially (and indeed likely) unbeknownst to their users. This paper presents the concept of residue-free computing in which a user can operate any existing application installed on their computer in a mode that prevents trace data from being recorded to disk, thus frustrating the forensic process and enabling more privacy-preserving computing. In essence, residue-free computing provides an “incognito mode” for any application. We introduce our implementation of residue-free computing, R esidue F ree , and motivate R esidue F ree by inventorying the potentially sensitive and privacy-invasive residue left by popular applications. We demonstrate that R esidue F ree allows users to operate these applications without leaving trace data, while incurring modest performance overheads.
more »
« less
Accessible and predictable QM-cluster model building for enzymes with the Residue Interaction Network Residue Selector
- Award ID(s):
- 1846408
- PAR ID:
- 10638830
- Publisher / Repository:
- Elsevier
- Date Published:
- Page Range / eLocation ID:
- 131 to 155
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
An official website of the United States government

