DocumentCode
623661
Title
D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources
Author
Boxuan Gu ; Xinfeng Li ; Gang Li ; Champion, Adam C. ; Zhezhe Chen ; Feng Qin ; Dong Xuan
Author_Institution
Dept. of Comput. Sci. & Eng., Ohio State Univ., Columbus, OH, USA
fYear
2013
fDate
14-19 April 2013
Firstpage
791
Lastpage
799
Abstract
With smartphones´ meteoric growth in recent years, leaking sensitive information from them has become an increasingly critical issue. Such sensitive information can originate from smartphones themselves (e.g., location information) or from many Internet sources (e.g., bank accounts, emails). While prior work has demonstrated information flow tracking´s (IFT´s) effectiveness at detecting information leakage from smartphones, it can only handle a limited number of sensitive information sources. This paper presents a novel IFT tagging strategy using differentiated and dynamic tagging. We partition information sources into differentiated classes and store them in fixed-length tags. We adjust tag structure based on time-varying received information sources. Our tagging strategy enables us to track at runtime numerous information sources in multiple classes and rapidly detect information leakage from any of these sources. We design and implement D2Taint, an IFT system using our tagging strategy on real-world smartphones. We experimentally evaluate D2Taint´s effectiveness with 84 real-world applications downloaded from Google Play. D2Taint reports that over 80% of them leak data to third-party destinations; 14% leak highly sensitive data. Our experimental evaluation using a standard benchmark tool illustrates D2Taint´s effectiveness at handling many information sources on smartphones with moderate runtime and space overhead.
Keywords
mobile computing; security of data; smart phones; tracking; D2Taint; Google Play; IFT tagging strategy; Internet source; differentiated information flow tracking; differentiated tagging; dynamic information flow tracking; dynamic tagging; information leakage detection; information source partitioning; sensitive information leaking; smartphone; tag structure; Androids; Runtime; Security; Sensitivity; Smart phones; Switches; Tagging;
fLanguage
English
Publisher
ieee
Conference_Titel
INFOCOM, 2013 Proceedings IEEE
Conference_Location
Turin
ISSN
0743-166X
Print_ISBN
978-1-4673-5944-3
Type
conf
DOI
10.1109/INFCOM.2013.6566866
Filename
6566866
Link To Document