[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/1924943.1924971acmotherconferencesArticle/Chapter ViewAbstractPublication PagesosdiConference Proceedingsconference-collections
Article

TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones

Published: 04 October 2010 Publication History

Abstract

Today's smartphone operating systems frequently fail to provide users with adequate control over and visibility into how third-party applications use their private data. We address these shortcomings with TaintDroid, an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data. TaintDroid provides realtime analysis by leveraging Android's virtualized execution environment. TaintDroid incurs only 14% performance overhead on a CPU-bound micro-benchmark and imposes negligible overhead on interactive third-party applications. Using TaintDroid to monitor the behavior of 30 popular third-party Android applications, we found 68 instances of potential misuse of users' private information across 20 applications. Monitoring sensitive data with TaintDroid provides informed use of third-party applications for phone users and valuable input for smartphone security service firms seeking to identify misbehaving applications.

References

[1]
Android. http://www.android.com.
[2]
Android Market. http://market.android.com.
[3]
Apache Harmony - Open Source Java Platform. http:// harmony.apache.org.
[4]
APPLE, INC. Apples App Store Downloads Top Three Billion. http://www.apple.com/pr/library/2010/ 01/05appstore.html, January 2010.
[5]
CHANDRA, D., AND FRANZ, M. Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine. In Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC) (December 2007).
[6]
CHENG, W., ZHAO, Q., YU, B., AND HIROSHIGE, S. Taint-Trace: Efficient Flow Tracing with Dyanmic Binary Rewriting. In Proceedings of the IEEE Symposium on Computers and Communications (ISCC) (June 2006), pp. 749-754.
[7]
CHOW, J., PFAFF, B., GARFINKEL, T., CHRISTOPHER, K., AND ROSENBLUM, M. Understanding Data Lifetime via Whole System Simulation. In Proceedings of the 13th USENIX Security Symposium (August 2004).
[8]
CLAUSE, J., LI, W., AND ORSO, A. Dytan: A Generic Dynamic Taint Analysis Framework. In Proceedings of the 2007 international symposium on Software testing and analysis (2007), pp. 196-206.
[9]
COSTA, M., CROWCROFT, J., CASTRO, M., ROWSTRON, A., ZHOU, L., ZHANG, L., AND BARHAM, P. Vigilante: End-to-End Containment of Internet Worms. In Proceedings of the ACM Symposium on Operating Systems Principles (2005).
[10]
COX, L. P., AND GILBERT, P. RedFlag: Reducing Inadvertent Leaks by Personal Machines. Tech. Rep. TR-2009-02, Duke University, 2009.
[11]
CRANDALL, J. R., AND CHONG, F. T. Minos: Control Data Attack Prevention Orthogonal to Memory Model. In Proceedings of the International Symposium on Microarchitecture (December 2004), pp. 221-232.
[12]
DAVIES, C. iPhone spyware debated as app library "phones home". http://www.slashgear.com/ iphone-spyware-debated-as-applibrary-phones-home-1752491/, August 17, 2009.
[13]
DENNING, D. E. A Lattice Model of Secure Information Flow. Communications of the ACM 19, 5 (May 1976), 236-243.
[14]
DENNING, D. E., AND DENNING, P. J. Certification of Programs for Secure Information Flow. Communications of the ACM 20, 7 (July 1977).
[15]
DESMET, L., JOOSEN, W., MASSACCI, F., PHILIPPAERTS, P., PIESSENS, F., SIAHAAN, I., AND VANOVERBERGHE, D. Security-by-contract on the .NET platform. Information Security Technical Report 13, 1 (January 2008), 25-32.
[16]
EGELE, M., KRUEGEL, C., KIRDA, E., YIN, H., AND SONG, D. Dyanmic Spyware Analysis. In Proceedings of the USENIX Annual Technical Conference (June 2007), pp. 233-246.
[17]
ENCK, W., GILBERT, P., CHUN, B.-G., COX, L. P., JUNG, J., MCDANIEL, P., AND SHETH, A. N. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. Tech. Rep. NAS-TR-0120-2010, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA, August 2010.
[18]
ENCK, W., ONGTANG, M., AND MCDANIEL, P. On Lightweight Mobile Phone Application Certification. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS) (November 2009).
[19]
FITZPATRICK, M. Mobile that allows bosses to snoop on staff developed. BBC News, March 2010. http://news.bbc. co.uk/2/hi/technology/8559683.stm.
[20]
Flurry Mobile Application Analytics. http://www.flurry. com/product/technical-info.html.
[21]
Google Maps for Mobile. http://www.google.com/ mobile/products/maps.html.
[22]
HALDAR, V., CHANDRA, D., AND FRANZ, M. Dynamic Taint Propagation for Java. In Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC) (December 2005), pp. 303-311.
[23]
HALFOND, W. G., ORSO, A., AND MANOLIOS, P. WASP: ProtectingWeb Applications Using Positive Tainting and Syntax-Aware Evaluation. IEEE Transactions on Software Engineering 34, 1 (2008), 65-81.
[24]
HEINTZE, N., AND RIECKE, J. G. The SLam Calculus: Programming with Secrecy and Integrity. In Proceedings of the Symposium on Principles of Programming Languages (POPL) (1998), pp. 365-377.
[25]
HICKS, B., AHMADIZADEH, K., AND MCDANIEL, P. Understanding practical application development in security-typed languages. In 22st Annual Computer Security Applications Conference (ACSAC) (2006), pp. 153-164.
[26]
HO, A., FETTERMAN, M., CLARK, C., WARFIELD, A., AND HAND, S. Practical Taint-Based Protection using Demand Emulation. In Proceedings of the European Conference on Computer Systems (EuroSys) (2006), pp. 29-41.
[27]
HOWELL, J., AND SCHECHTER, S. What You See is What they Get: Protecting users from unwanted use of microphones, camera, and other sensors. In Proceedings of Web 2.0 Security and Privacy Workshop (2010).
[28]
JUNG, J., SHETH, A., GREENSTEIN, B., WETHERALL, D., MAGANIS, G., AND KOHNO, T. Privacy Oracle: A System for Finding Application Leaks with Black Box Differential Testing. In Proceedings of ACM CCS (2008).
[29]
KING, D., HICKS, B., HICKS, M., AND JAEGER, T. Implicit Flows: Can't Live with 'Em, Can't Live without 'Em. In Proceedings of the International Conference on Information Systems Security (2008).
[30]
KROHN, M., YIP, A., BRODSKY, M., CLIFFER, N., KAASHOEK, M. F., KOHLER, E., AND MORRIS, R. Information Flow Control for Standard OS Abstractions. In Proceedings of ACM Symposium on Operating Systems Principles (2007).
[31]
LAM, L. C., AND CKER CHIUEH, T. A General Dynamic Information Flow Tracking Framework for Security Applications. In Proceedings of the Annual Computer Security Applications Conference (ACSAC) (2006).
[32]
LIANG, S. Java Native Interface: Programmer's Guide and Specification. Prentice Hall PTR, 1999.
[33]
LOOKOUT. Introducing the App Genome Project. http://blog.mylookout.com/2010/07/ introducing-the-app-genome-project/, July 2010.
[34]
MIGLIAVACCA, M., PAPAGIANNIS, I., EYERS, D.M., SHAND, B., BACON, J., AND PIETZUCH, P. DEFCon: High-Performance Event Processing with Information Security. In PROCEEDINGS of the USENIX Annual Technical Conference (2010).
[35]
MOREN, D. Retrievable iPhone numbers mean potential privacy issues. http://www.macworld.com/article/ 143047/2009/09/phone_hole.html, September 29, 2009.
[36]
MULLINER, C., VIGNA, G., DAGON, D., AND LEE, W. Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. In Proceedings of Detection of Intrusions and Malware & Vulnerability Assessment (DIMVA) (2006).
[37]
MYERS, A. C. JFlow: Practical Mostly-Static Information Flow Control. In Proceedings of the ACM Symposium on Principles of Programming Langauges (POPL) (January 1999).
[38]
MYERS, A. C., AND LISKOV, B. Protecting Privacy Using the Decentralized Label Model. ACM Transactions on Software Engineering and Methodology 9, 4 (October 2000), 410-442.
[39]
NAIR, S. K., SIMPSON, P. N., CRISPO, B., AND TANENBAUM, A. S. A Virtual Machine Based Information Flow Control System for Policy Enforcement. In the 1st International Workshop on Run Time Enforcement for Mobile and Distributed Systems (REM) (2007).
[40]
NEWSOME, J., MCCAMANT, S., AND SONG, D. Measuring channel capacity to distinguish undue influence. In ACM SIGPLAN Workshop on Programming Languages and Analysis for Security (2009).
[41]
NEWSOME, J., AND SONG, D. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proc. of Network and Distributed System Security Symposium (2005).
[42]
ONGTANG, M., MCLAUGHLIN, S., ENCK, W., AND MCDANIEL, P. Semantically Rich Application-Centric Security in Android. In Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC) (2009).
[43]
PENDRAGON SOFTWARE CORPORATION. CaffeineMark 3.0. http://www.benchmarkhq.ru/cm30/.
[44]
QIN, F., WANG, C., LI, Z., SEOP KIM, H., ZHOU, Y., AND WU, Y. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. In Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture (2006), pp. 135-148.
[45]
ROY, I., PORTER, D. E., BOND, M. D., MCKINLEY, K. S., AND WITCHEL, E. Laminar: Practical Fine-Grained Decentralized Information Flow Control. In Proceedings of Programming Language Design and Implementation (2009).
[46]
SABELFELD, A., AND MYERS, A. C. Language-based information-flow security. IEEE Journal on Selected Areas in Communication 21, 1 (January 2003), 5-19.
[47]
SAXENA, P., SEKAR, R., AND PURANIK, V. Efficient Fine-Grained Binary Instrumentation with Applications to Taint-Tracking. In Proceedings of the IEEE/ACM symposium on Code Generation and Optimization (CGO) (2008).
[48]
SCHWARTZ, E. J., AVGERINOS, T., AND BRUMLEY, D. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but might have been afraid to ask). In IEEE Symposium on Security and Privacy (2010).
[49]
SLOWINSKA, A., AND BOS, H. Pointless Tainting? Evaluating the Practicality of Pointer Tainting. In Proceedings of the European Conference on Computer Systems (EuroSys) (April 2009), pp. 61-74.
[50]
SUH, G. E., LEE, J. W., ZHANG, D., AND DEVADAS, S. Secure Program Execution via Dynamic Information Flow Tracking. In Proceedings of Architectural Support for Programming Languages and Operating Systems (2004).
[51]
VACHHARAJANI, N., BRIDGES, M. J., CHANG, J., RANGAN, R., OTTONI, G., BLOME, J. A., REIS, G. A., VACHHARAJANI, M., AND AUGUST, D. I. RIFLE: An Architectural Framework for User-Centric Information-Flow Security. In Proceedings of the 37th annual IEEE/ACM International Symposium on Microarchitecture (2004), pp. 243-254.
[52]
VANDEBOGART, S., EFSTATHOPOULOS, P., KOHLER, E., KROHN, M., FREY, C., ZIEGLER, D., KAASHOEK, F., MORRIS, R., AND MAZI `ERES, D. Labels and Event Processes in the Asbestos Operating System. ACM Transactions on Computer Systems (TOCS) 25, 4 (December 2007).
[53]
VOGT, P., NENTWICH, F., JOVANOVIC, N., KIRDA, E., KRUEGEL, C., AND VIGNA, G. Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In Proc. of Network & Distributed System Security (2007).
[54]
WANG, X., LI, Z., LI, N., AND CHOI, J. Y. PRECIP: Towards Practical and Retrofittable Confidential Information Protection. In Proceedings of 15th Network and Distributed System Security Symposium (NDSS) (2008).
[55]
WhatApp. http://www.whatapp.org. Accessed April 2010.
[56]
XU, W., BHATKAR, S., AND SEKAR, R. Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks. In Proceedings of the USENIX Security Symposium (August 2006), pp. 121-136.
[57]
YIN, H., SONG, D., EGELE, M., KRUEGEL, C., AND KIRDA, E. Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In Proceedings of ACM Computer and Communications Security (2007).
[58]
YIP, A., WANG, X., ZELDOVICH, N., AND KAASHOEK, M. F. Improving Application Security with Data Flow Assertions. In Proceedings of the ACM Symposium on Operating Systems Principles (Oct. 2009).
[59]
YUMEREFENDI, A. R., MICKLE, B., AND COX, L. P. TightLip: Keeping Applications from Spilling the Beans. In Proceedings of the 4th USENIX Symposium on Network Systems Design & Implementation (NSDI) (2007).
[60]
ZELDOVICH, N., BOYD-WICKIZER, S., KOHLER, E., AND MAZIÈRES, D. Making Information Flow Explicit in HiStar. In Proceedings of the 7th symposium on Operating Systems Design and Implementation (OSDI) (2006).
[61]
ZHU, D., JUNG, J., SONG, D., KOHNO, T., AND WETHERALL, D. Privacy Scope: A Precise Information Flow Tracking System For Finding Application Leaks. Tech. Rep. EECS-2009-145, Department of Computer Science, UC Berkeley, 2009.

Cited By

View all
  • (2024)HardTaint: Production-Run Dynamic Taint Analysis via Selective Hardware TracingProceedings of the ACM on Programming Languages10.1145/36897688:OOPSLA2(1615-1640)Online publication date: 8-Oct-2024
  • (2022)A survey of security vulnerabilities in Android automotive appsProceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems10.1145/3524489.3527300(17-24)Online publication date: 16-May-2022
  • (2021)A fait accompli? an empirical study into the absence of consent to third-party tracking in android appsProceedings of the Seventeenth USENIX Conference on Usable Privacy and Security10.5555/3563572.3563582(181-195)Online publication date: 9-Aug-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
OSDI'10: Proceedings of the 9th USENIX conference on Operating systems design and implementation
October 2010
386 pages

Sponsors

  • NSF: National Science Foundation
  • Google Inc.
  • Infosys
  • Microsoft Research: Microsoft Research
  • USENIX Assoc: USENIX Assoc

In-Cooperation

Publisher

USENIX Association

United States

Publication History

Published: 04 October 2010

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 29 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)HardTaint: Production-Run Dynamic Taint Analysis via Selective Hardware TracingProceedings of the ACM on Programming Languages10.1145/36897688:OOPSLA2(1615-1640)Online publication date: 8-Oct-2024
  • (2022)A survey of security vulnerabilities in Android automotive appsProceedings of the 3rd International Workshop on Engineering and Cybersecurity of Critical Systems10.1145/3524489.3527300(17-24)Online publication date: 16-May-2022
  • (2021)A fait accompli? an empirical study into the absence of consent to third-party tracking in android appsProceedings of the Seventeenth USENIX Conference on Usable Privacy and Security10.5555/3563572.3563582(181-195)Online publication date: 9-Aug-2021
  • (2021)A Practical Approach for Dynamic Taint Tracking with Control-flow RelationshipsACM Transactions on Software Engineering and Methodology10.1145/348546431:2(1-43)Online publication date: 24-Dec-2021
  • (2021)Algebraic-datatype taint tracking, with applications to understanding Android identifier leaksProceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering10.1145/3468264.3468550(70-82)Online publication date: 20-Aug-2021
  • (2021)LensCapProceedings of the 19th Annual International Conference on Mobile Systems, Applications, and Services10.1145/3458864.3467676(14-27)Online publication date: 24-Jun-2021
  • (2021)An Analysis of Web Tracking Domains in Mobile ApplicationsProceedings of the 13th ACM Web Science Conference 202110.1145/3447535.3462507(291-298)Online publication date: 21-Jun-2021
  • (2021)Systematic Mutation-Based Evaluation of the Soundness of Security-Focused Android Static Analysis TechniquesACM Transactions on Privacy and Security10.1145/343980224:3(1-37)Online publication date: 9-Feb-2021
  • (2020)CardplianceProceedings of the 29th USENIX Conference on Security Symposium10.5555/3489212.3489298(1517-1533)Online publication date: 12-Aug-2020
  • (2020)Actions speak louder than wordsProceedings of the 29th USENIX Conference on Security Symposium10.5555/3489212.3489268(985-1002)Online publication date: 12-Aug-2020
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media