Publication | Closed Access
AppCaulk: Data Leak Prevention by Injecting Targeted Taint Tracking into Android Apps
32
Citations
14
References
2014
Year
Unknown Venue
Mobile SecurityEngineeringInformation SecurityDynamic Taint AnalysisSoftware EngineeringData Leak PreventionTaint DroidSoftware AnalysisHardware SecurityTrusted Execution EnvironmentAndroid AppsSecure By DesignData PrivacyMobile MalwareApplication AnalysisMobile ComputingComputer ScienceData SecurityCryptographySoftware SecurityAndroid AppProgram AnalysisSystem Software
As Android is entering the business domain, leaks of business-critical and personal information through apps become major threats. Due to the context-insensitive nature of the Android permission model, information flow policies cannot be enforced by on-board mechanisms. We therefore propose AppCaulk, an approach to harden any existing Android app by injecting a targeted dynamic taint analysis, which tracks and blocks unwanted information flows at runtime. Critical data flows are first discovered using a static taint analysis and the relevant data propagation paths are instrumented by a taint tracking code at register level. At runtime the dynamic taint analysis woven into the app detects and blocks data leaks as they are about to occur. In contrast to existing taint analysis approaches like Taint droid, AppCaulk does not require modification of the Android middleware and can thus be applied to any stock Android installation. In this paper, we explain the design of AppCaulk, describe the evaluation of its prototype, and compare its effectiveness with Taintdroid.
| Year | Citations | |
|---|---|---|
Page 1
Page 1