2013 Proceedings IEEE INFOCOM 2013
DOI: 10.1109/infcom.2013.6566866
|View full text |Cite
|
Sign up to set email alerts
|

D2Taint: Differentiated and dynamic information flow tracking on smartphones for numerous data sources

Abstract: Abstract-With smartphones' meteoric growth in recent years, leaking sensitive information from them has become an increasingly critical issue. Such sensitive information can originate from smartphones themselves (e.g., location information) or from many Internet sources (e.g., bank accounts, emails). While prior work has demonstrated information flow tracking's (IFT's) effectiveness at detecting information leakage from smartphones, it can only handle a limited number of sensitive information sources. This pap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
10
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(10 citation statements)
references
References 16 publications
(17 reference statements)
0
10
0
Order By: Relevance
“…RELATED WORK In response to the widespread popularity of smartphones, much attention has been paid in studying application security and user privacy related issues. Extensive security analysis on smartphone apps has been carried out and can be categorized into permission analysis, static analysis, and dynamic analysis [3], [5], [6], [10], [13], [15], [26]- [31].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…RELATED WORK In response to the widespread popularity of smartphones, much attention has been paid in studying application security and user privacy related issues. Extensive security analysis on smartphone apps has been carried out and can be categorized into permission analysis, static analysis, and dynamic analysis [3], [5], [6], [10], [13], [15], [26]- [31].…”
Section: Discussionmentioning
confidence: 99%
“…TaintDroid [3] tracks the flow of privacy sensitive data and reports when sensitive data leaves the system via interfaces such as network connections. D2Taint [15] tracks detailed private leakage sources at runtime in multiple classes and detects leakages from any of these sources rapidly. Agarwal et al [11] proposes ProtectMyPrivacy (PMP) which utilizes a crowdsourcing based mechanism to help users decide proper privacy settings for iOS apps.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…DIFT has been shown to be effective in protecting systems against several softwarebased attacks, including leakage of information [23] and code injection [24]. DIFT is now implemented on different types of architectures [19], [25], including smartphones [23], [26]. Most of the approaches on hardware-based DIFT focused only on securing processor cores and the associated logic, i.e., tightly coupled accelerators, memories and communication channels.…”
Section: Introductionmentioning
confidence: 99%
“…In [2] Enck et al presented TaintDroid and exposed the threat, proving by example, that more than a third of the most popular applications available on Google Play are responsible for sensitive information leakage. More recently Gu et al presented in [3] D2taint a system able to track system data flows for Java code at the variable level, similar to 1 what TaintDroid does. D2taint goes further than TaintDroid since its tagging strategy permits numerous information sources in multiple classes at runtime.…”
Section: Introductionmentioning
confidence: 99%