Title :
D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources
Author :
Boxuan Gu ; Xinfeng Li ; Gang Li ; Champion, Adam C. ; Zhezhe Chen ; Feng Qin ; Dong Xuan
Author_Institution :
Dept. of Comput. Sci. & Eng., Ohio State Univ., Columbus, OH, USA
Abstract :
With smartphones´ meteoric growth in recent years, leaking sensitive information from them has become an increasingly critical issue. Such sensitive information can originate from smartphones themselves (e.g., location information) or from many Internet sources (e.g., bank accounts, emails). While prior work has demonstrated information flow tracking´s (IFT´s) effectiveness at detecting information leakage from smartphones, it can only handle a limited number of sensitive information sources. This paper presents a novel IFT tagging strategy using differentiated and dynamic tagging. We partition information sources into differentiated classes and store them in fixed-length tags. We adjust tag structure based on time-varying received information sources. Our tagging strategy enables us to track at runtime numerous information sources in multiple classes and rapidly detect information leakage from any of these sources. We design and implement D2Taint, an IFT system using our tagging strategy on real-world smartphones. We experimentally evaluate D2Taint´s effectiveness with 84 real-world applications downloaded from Google Play. D2Taint reports that over 80% of them leak data to third-party destinations; 14% leak highly sensitive data. Our experimental evaluation using a standard benchmark tool illustrates D2Taint´s effectiveness at handling many information sources on smartphones with moderate runtime and space overhead.
Keywords :
mobile computing; security of data; smart phones; tracking; D2Taint; Google Play; IFT tagging strategy; Internet source; differentiated information flow tracking; differentiated tagging; dynamic information flow tracking; dynamic tagging; information leakage detection; information source partitioning; sensitive information leaking; smartphone; tag structure; Androids; Runtime; Security; Sensitivity; Smart phones; Switches; Tagging;
Conference_Titel :
INFOCOM, 2013 Proceedings IEEE
Conference_Location :
Turin
Print_ISBN :
978-1-4673-5944-3
DOI :
10.1109/INFCOM.2013.6566866