期刊文献+

基于TaintDroid的动态污点检测技术分析 被引量:3

Taint Droid-based Dynamic Taint Detection Technology
下载PDF
导出
摘要 随着android智能手机的普及,用户隐私泄露成为智能终端上最严重的安全问题之一。TaintDroid首次在android平台上实现了动态污点追踪,是当前解决Android平台隐私泄露问题的研究的热点。在综述TaintDroid及其基本架构的基础上,深入分析了TaintDroid污点标记的添加、存储、传播和提取等关键技术,并通过Android实际应用对TaintDroid如何检测隐私泄露进行了验证。最后给出了TaintDroid存在的不足和需要的改进之处,为今后的进一步研究指出了方向。 With the popularity of android smart phones, user privacy disclosure becomes one of the most serious security problems. TaintDroid for the first time realizes dynamic taint tracking on the android platform and becomes the hot research topic in solving the problem of privacy disclosure. Based on the review of TaintDroid and its basic architecture, this paper analyzes in depth the key technologies including the adding, storage, dissemination and extraction of taint marks. In addition, how for TaintDriod to detect privacy disclosure is verified through practical application of Android. Finally, this paper presents the deficiencies and the points to be improved existing in TaintDroid, thus pointing out the direction for further research.
出处 《通信技术》 2016年第2期221-226,共6页 Communications Technology
基金 国家863课题(No.2015AA011104)~~
关键词 ANDROID TaintDroid 隐私泄露 动态污点检测 Android TaintDroid privacy disclosure dynamic taint track
  • 相关文献

参考文献15

  • 1吴俊昌,蒋凡,程绍银.基于程序分析的Android应用恶意行为检测[J].通信技术,2013,46(7):69-72. 被引量:2
  • 2Enck W, Gilbert P, Chun B G, et ",d. TaintDroid: An In- formation-Flow Tracking System for Realtime Privacy Moni- toring on Smartphones. [ C]//Usenix Conference on Operat- ing Systems Design & Implementation. 2010:99-106.
  • 3蔡吕.Android平台恶意软件动态监测系统的设计与实现[D].北京:北京交通大学,2013.
  • 4CHENG K, CUI Y. Design and Implementation of Net- work Packets CoUection Tools hased on the Android Plat- form [ C ]// Fuzzy Systems and Knowledge Discovery (FSKD), 2012 9th International Conference on. IEEE, 2012:2166-2169.
  • 5Kovacheva A. Efficient Code Obfuscation for Android [ M ~ // Advances in Information Technology. Springer In- tel~aational Publishing, 2013 : 104-119.
  • 6Protsenko M, Kreuter S, Muller T. Dynamic Self-Protection and Tamperproofing for Android Apps Using Native Code [C]// Availability, Reliability and Security (ARES), 2015 10th International Conference on. IEEE,2015.
  • 7Claiborne C L, Ncube C, Dantu R. Random Anonymiza-tion of Mobile Sensor Data : Modified Android Framework ~ C ]//Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on. IEEE, 2015.
  • 8ZHU D, JUNG J, SONG D, et al. TaintEraser: Protec- ting Sensitive Data Leaks using Application-Level Taint Tracking ~ J ]. Acm Sigops Operating Systems Review, 2011, 45(1) :142-154.
  • 9Schwartz E J, Avgerinos T, Brumley D. All You Ever Wanted to Know about Dynamic Taint Analysis and For- ward Symbolic Execution (but Might Have Been Afraid to Ask) [ C]// Security and Privacy ( SP), 2010 IEEE Symposium on. IEEE, 2010:317-331.
  • 10YUAN J, QIANG W, JIN H, et at. CloudTaint: An E- lastic Taint Tracking Framework for Malware Detection in the Cloud[ J]. Journal of Supercomputing, 2014, 70 ( 3 ) : 1433-1450.

二级参考文献101

  • 1Hornyack P,Han S,Jung J,et al.These Aren’t the Droids You’reLooking for:Retrofitting Android to Protect Data from ImperiousApplications[C]//Proc.of CCS’11.Chicago,USA:[s.n.],2011.
  • 2Enck W,Gilbert P,Chun B,et al.TaintDroid:An Informa-tion-flow Tracking System for Realtime Privacy Monitoring onSmartphones[C]//Proc.of OSDI’10.Vancouver,Canada:[s.n.],2010.
  • 3Beresford A R,Rice A,Skehin N,et al.MockDroid:TradingPrivacy for Application Functionality on Smartphones[C]//Proc.ofthe 12th Workshop on Mobile Computing Systems and Appli-cations.Phoenix,USA:[s.n.],2011.
  • 4Enck W,Octeau D,McDaniel P,et al.A Study of AndroidApplication Security[C]//Proc.of the 20th USENIX SecuritySymposium.San Francisco,USA:[s.n.],2011.
  • 5Goldberg I,Wagner D,Thomas R,et al.A Secure Environment forUntrusted Helper Applications(Confining the Wily Hacker)[C]//Proc.of the 6th USENIX UNIX Security Symposium.San Jose,California,USA:[s.n.],1996.
  • 6Sabelfeld A,Myers A C.Language-based Information-flow Secu-rity[J].IEEE Journal on Selected Areas in Communications,2003,21(1):5-19.
  • 7Ligatti J,Bauer L,Walker D.Edit Automata:Enforcement Me-chanisms for Run-time Security Policies[J].International Journalof Information Security,2005,4(1-2):2-16.
  • 8Wang Tielei,Wei Tao,Gu Guofei,et al.TaintScope:A Checksum-aware Directed Fuzzing Tool for Automatic Software VulnerabilityDetection[C]//Proc.of the 31st IEEE Symposium on Security&Privacy.Berkeley,USA:[s.n.],2010.
  • 9Enck W.Defending Users Against Smartphone Apps:Techniquesand Future Directions[C]//Proc.of ICISS’11.Kolkata,India:[s.n.],2011.
  • 10Gilbert P,Chun B,Cox L P,et al.Vision:Automated SecurityValidation of Mobile Apps at App Markets[C]//Proc.of MCS’11.Washington D.C.,USA:[s.n.],2011.

共引文献73

同被引文献15

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部