DocumentCode
595572
Title
“TrustDroid™”: Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking
Author
Zhibo Zhao ; Osono, F.C.C.
Author_Institution
Wireless Syst. Security Res. Lab., Brandeis Univ., Waltham, MA, USA
fYear
2012
fDate
16-18 Oct. 2012
Firstpage
135
Lastpage
143
Abstract
Over the last 12 years three important dates have marked the beginning of a major paradigm shift in computing and the security models applied to protect an emerging computing environment - March 1999, January 9th, 2007, and July 2007. These dates roughly correspond to the birth of SalesForce.com, the most successful Software as a Service (SaS) provider to date, Steve Jobs introduction of the Iphone,, and the discovery of the Zeus Botnet. These innovations have been instrumental in enabling a paradigm shift in computing, away from a corporate network centric model with Windows end-point devices to what we called in this manuscript the Circa 2020 Computing Model. In the circa 2020 Computing model applications and data reside in the Cloud, the concept of an extended Trust Domain (network) disappears - there is no corporate network, and finally the end-point device is a SmartPhone owned and operated by employees - Bring Your Own Device (BYOD). In such an environment, the end-point device is not “Trusted”, and there is a high likelihood that the BYOD can be used as a channel to leak sensitive data. In this manuscript, we present a new mechanism to prevent such a situation. We called this mechanism “TrustDroid™”. TrustDroid™ is a static analyzer based on taint tracking that can be used to prevent leakage of sensitive information by an un-trusted Android SmartPhone.
Keywords
cloud computing; data privacy; mobile computing; program diagnostics; security of data; smart phones; trusted computing; Iphone; SaS provider; SalesForce.com; Software as a Service; TrustDroid; Windows end-point device; Zeus Botnet; cloud computing; corporate network centric model; information leaking; security model; sensitive data leakage; sensitive information leakage; smartphones; static analysis taint tracking; trust domain; untrusted Android smartphone; Abstracts; Libraries; Sockets; Software; Telephony;
fLanguage
English
Publisher
ieee
Conference_Titel
Malicious and Unwanted Software (MALWARE), 2012 7th International Conference on
Conference_Location
Fajardo, PR
Print_ISBN
978-1-4673-4880-5
Type
conf
DOI
10.1109/MALWARE.2012.6461017
Filename
6461017
Link To Document