2017
DOI: 10.1007/978-3-319-58469-0_14
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Side Channel Attacks Based on Data Tainting in Android Systems

Abstract: Part 4: Operating System and Firmware SecurityInternational audienceMalicious third-party applications can leak personal data stored in the Android system by exploiting side channels. TaintDroid uses a dynamic taint analysis mechanism to control the manipulation of private data by third-party apps [9]. However, TaintDroid does not propagate taint in side channels. An attacker can exploit this limitation to get private data. For example, Sarwar et al. [2] present side channel class of attacks using a medium tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…Original data can be transformed, for example, by writing its content in a pixel bitmap. However, TaintDroid issues warning reports if tainted data is leaked by an application, even if it was transformed since the taint is propagated through these side channels [25]. A similar tool developed by Sun et al enables a multilevel information flow tracking by utilizing registers for taint storage, having only a 15% overhead on the CPU [44].…”
Section: Where To Find Sensitive Data and How To Track It?mentioning
confidence: 99%
See 1 more Smart Citation
“…Original data can be transformed, for example, by writing its content in a pixel bitmap. However, TaintDroid issues warning reports if tainted data is leaked by an application, even if it was transformed since the taint is propagated through these side channels [25]. A similar tool developed by Sun et al enables a multilevel information flow tracking by utilizing registers for taint storage, having only a 15% overhead on the CPU [44].…”
Section: Where To Find Sensitive Data and How To Track It?mentioning
confidence: 99%
“…It presents an enhancement of TaintDroid formerly developed in terms of taint storage and resource consumption [17]. Considerable research is being conducted in this field as in [19,25,50,51].…”
Section: Where To Find Sensitive Data and How To Track It?mentioning
confidence: 99%