scispace - formally typeset
Open AccessProceedings ArticleDOI

TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones

Reads0
Chats0
TLDR
Using TaintDroid to monitor the behavior of 30 popular third-party Android applications, this work found 68 instances of misappropriation of users' location and device identification information across 20 applications.
Abstract
Today's smartphone operating systems frequently fail to provide users with adequate control over and visibility into how third-party applications use their private data. We address these shortcomings with TaintDroid, an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data. TaintDroid provides realtime analysis by leveraging Android's virtualized execution environment. TaintDroid incurs only 14% performance overhead on a CPU-bound micro-benchmark and imposes negligible overhead on interactive third-party applications. Using TaintDroid to monitor the behavior of 30 popular third-party Android applications, we found 68 instances of potential misuse of users' private information across 20 applications. Monitoring sensitive data with TaintDroid provides informed use of third-party applications for phone users and valuable input for smartphone security service firms seeking to identify misbehaving applications.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

TL;DR: TaintDroid as mentioned in this paper is an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data by leveraging Android's virtualized execution environment.
Proceedings ArticleDOI

Dissecting Android Malware: Characterization and Evolution

TL;DR: Systematize or characterize existing Android malware from various aspects, including their installation methods, activation mechanisms as well as the nature of carried malicious payloads reveal that they are evolving rapidly to circumvent the detection from existing mobile anti-virus software.
Proceedings ArticleDOI

DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket.

TL;DR: DREBIN is proposed, a lightweight method for detection of Android malware that enables identifying malicious applications directly on the smartphone and outperforms several related approaches and detects 94% of the malware with few false alarms.
Proceedings ArticleDOI

FlowDroid: precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for Android apps

TL;DR: FlowDroid is presented, a novel and highly precise static taint analysis for Android applications that successfully finds leaks in a subset of 500 apps from Google Play and about 1,000 malware apps from the VirusShare project.
Proceedings ArticleDOI

Android permissions: user attention, comprehension, and behavior

TL;DR: It is found that current Android permission warnings do not help most users make correct security decisions, however, a notable minority of users demonstrated both awareness of permission warnings and reasonable rates of comprehension.
References
More filters
Proceedings Article

Aurasium: practical policy enforcement for Android applications

TL;DR: A novel solution called Aurasium is developed that bypasses the need to modify the Android operating system while providing much of the security and privacy that users desire, and has been tested on three versions of the Android OS, and is freely available.
Proceedings ArticleDOI

Semantically Rich Application-Centric Security in Android

TL;DR: This paper considers the security requirements of smartphone applications and augment the existing Android operating system with a framework to meet them, and presents Secure Application INTeraction (Saint), a modified infrastructure that governs install-time permission assignment and their run-time use as dictated by application provider policy.
Proceedings Article

Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks

TL;DR: This paper presents a new approach to strengthen policy enforcement by augmenting security policies with information about the trustworthiness of data used in securitysensitive operations, and evaluated this technique using 9 available exploits involving several popular software packages containing the above types of vulnerabilities.
Proceedings Article

Understanding data lifetime via whole system simulation

TL;DR: This investigation reveals that Mozilla, Apache, and Perl, which are used to process millions of passwords, credit card numbers, etc, take virtually no measures to limit the lifetime of sensitive data they handle, leaving passwords and other sensitive data scattered throughout user and kernel memory.
Proceedings Article

Quire: lightweight provenance for smart phone operating systems

TL;DR: Quire tracks the call chain of on-device IPCs, allowing an app the choice of operating with the reduced privileges of its callers or exercising its full privilege set by acting explicitly on its own behalf.
Related Papers (5)