An Offloaded Dynamic Taint Analysis Approach for Privacy Leakage Detection on Android Hui Xu 1.

5
An Offloaded Dynamic Taint Analysis Approach for Privacy Leakage Detection on Android Hui Xu 1

Transcript of An Offloaded Dynamic Taint Analysis Approach for Privacy Leakage Detection on Android Hui Xu 1.

Page 1: An Offloaded Dynamic Taint Analysis Approach for Privacy Leakage Detection on Android Hui Xu 1.

An Offloaded Dynamic Taint Analysis Approach for

Privacy Leakage Detection on Android

Hui Xu

1

Page 2: An Offloaded Dynamic Taint Analysis Approach for Privacy Leakage Detection on Android Hui Xu 1.

Motivation:

ContactList SMS Call

LogBrowserHistory Account Location

2

Page 3: An Offloaded Dynamic Taint Analysis Approach for Privacy Leakage Detection on Android Hui Xu 1.

Adversary Model & State-of-the-art Work• Adversary Model: Official applications may read sensitive data stored on phones,

and transmit such information via network. • TaintDroid, Published in USENIX 2011

• Usability Issue: need OS recompilation

Read Send

Memory1

SensitiveData

Program Trace

DataMemory2

[Program Trace, Memory Access] => Data Leakage3

Page 4: An Offloaded Dynamic Taint Analysis Approach for Privacy Leakage Detection on Android Hui Xu 1.

Smartphone

Behavior Profiler

Our Approach: Overall Architecture

Android Emulator

SignatureDB

ApplicationsSignatures

Taint Module

BehaviorProfilerDetecto

r

Server

Automated Testing Tool

Analyzer

4

Page 5: An Offloaded Dynamic Taint Analysis Approach for Privacy Leakage Detection on Android Hui Xu 1.

Leakage Instances

• Two sets of apps:• Set I: Apps causing no leakage => Red Table.• Set II: Apps causing leakage => Black Table

• Data metric• Applications may leak different data (e.g., some leak contact list, some leak

IMEI)• sensitive data should be considered separately

Situation Read Send Leakage

I No No No

II Yes No No

III Yes Yes Yes

IV Yes Perhaps Yes5