DocumentCode :
184958
Title :
Using Taint Analysis for Threat Risk of Cloud Applications
Author :
Ping Wang ; Wun Jie Chao ; Kuo-Ming Chao ; Chi-Chun Lo
Author_Institution :
Dept. of Inf. Manage., Kun Shan Univ., Tainan, Taiwan
fYear :
2014
fDate :
5-7 Nov. 2014
Firstpage :
185
Lastpage :
190
Abstract :
Most existing approaches to developing cloud applications using threat analysis involve program vulnerability analyses for identifying the security holes associated with malware attacks. New malware attacks can bypass firewall-based detection by bypassing stack protection and by using Hypertext Transfer Protocol logging, kernel hacks, and library hack techniques, and to the cloud applications. In performing threat analysis for unspecified malware attacks, software engineers can use a taint analysis technique for tracking information flows between attack sources (malware) and detect vulnerabilities of targeted network applications. This paper proposes a threat risk analysis model incorporating an improved attack tree analysis scheme for solving the mobile security problem, in the model, Android programs perform taint checking to analyse the risks posed by suspicious applications. In probabilistic risk analysis, defence evaluation metrics are used for each attack path for assisting a defender simulate the attack results against malware attacks and estimate the impact losses. Finally, a case of threat analysis of a typical cyber security attack is presented to demonstrate the proposed approach.
Keywords :
Android (operating system); firewalls; hypermedia; invasive software; mobile computing; program diagnostics; risk analysis; trees (mathematics); Android programs; attack sources; cloud applications; cyber security attack; defence evaluation metrics; firewall-based detection; hypertext transfer protocol logging; improved attack tree analysis scheme; information flow tracking; kernel hacks; library hack techniques; malware attacks; mobile security problem; probabilistic risk analysis; program vulnerability analysis; security holes; software engineers; stack protection; taint analysis technique; taint checking; threat analysis; threat risk analysis model; Analytical models; Malware; Measurement; Probabilistic logic; Risk analysis; Software; Attack defence tree; Cyber attacks; Taint checking; Threat; analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
e-Business Engineering (ICEBE), 2014 IEEE 11th International Conference on
Conference_Location :
Guangzhou
Print_ISBN :
978-1-4799-6562-5
Type :
conf
DOI :
10.1109/ICEBE.2014.40
Filename :
6982078
Link To Document :
بازگشت