TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

被引:795
作者
Enck, William [1 ]
Gilbert, Peter [2 ]
Han, Seungyeop [3 ]
Tendulkar, Vasant [4 ]
Chun, Byung-Gon [5 ]
Cox, Landon P. [6 ]
Jung, Jaeyeon [7 ]
McDaniel, Patrick [8 ]
Sheth, Anmol N. [9 ]
机构
[1] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
[2] Duke Univ, Dept Comp Sci, Durham, NC 27706 USA
[3] Univ Washington, Dept Comp Sci & Engn, Seattle, WA 98195 USA
[4] N Carolina State Univ, Dept Comp Sci, Raleigh, NC 27695 USA
[5] Seoul Natl Univ, Dept Comp Sci & Engn, Seoul, South Korea
[6] Duke Univ, Dept Comp Sci, Durham, NC 27706 USA
[7] Microsoft Res, State Coll, PA USA
[8] Penn State Univ, State Coll, PA USA
[9] Technicolor Res, Palo Alto, CA USA
来源
ACM TRANSACTIONS ON COMPUTER SYSTEMS | 2014年 / 32卷 / 02期
基金
美国国家科学基金会; 新加坡国家研究基金会;
关键词
Design; Security; Performance; Information-flow tracking; privacy monitoring; smartphones; mobile apps; FRAMEWORK;
D O I
10.1145/2619091
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Today's smartphone operating systems frequently fail to provide users with visibility into how third-party applications collect and share their private data. We address these shortcomings with TaintDroid, an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data. TaintDroid enables realtime analysis by leveraging Android's virtualized execution environment. TaintDroid incurs only 32% performance overhead on a CPU-bound microbenchmark and imposes negligible overhead on interactive third-party applications. Using TaintDroid to monitor the behavior of 30 popular third-party Android applications, in our 2010 study we found 20 applications potentially misused users' private information; so did a similar fraction of the tested applications in our 2012 study. Monitoring the flow of privacy-sensitive data with TaintDroid provides valuable input for smartphone users and security service firms seeking to identify misbehaving applications.
引用
收藏
页数:29
相关论文
共 77 条
  • [1] [Anonymous], 2012, P USENIX SEC S
  • [2] [Anonymous], 2011, P 20 USENIX SEC S
  • [3] [Anonymous], 2013, P ACM C COMP COMM SE
  • [4] [Anonymous], P ACM C COMP COMM SE
  • [5] [Anonymous], 2009, Proceedings of the ACM SIGPLAN Fourth Workshop on Programming Languages and Analysis for Security
  • [6] [Anonymous], RETRIEVABLE IPHONE N
  • [7] [Anonymous], P USENIX SEC S
  • [8] [Anonymous], 1999, P ACM S PRINC PROGR
  • [9] [Anonymous], P 13 USENIX SEC S
  • [10] [Anonymous], 2011, P 12 WORKSH MOB COMP