"TrustDroid™": Preventing the use of SmartPhones for information leaking in corporate networks through the used of static analysis taint tracking

نویسندگان

  • Zhibo Zhao
  • Fernando C. Colón Osorio
چکیده

Over the last 12 years three important dates have marked the beginning of a major paradigm shift in computing and the security models applied to protect an emerging computing environment March 1999, January 9th, 2007, and July 2007. These dates roughly correspond to the birth of SalesForce.com, the most successful Software as a Service (SaS) provider to date, Steve Jobs introduction of the Iphone,, and the discovery of the Zeus Botnet. These innovations have been instrumental in enabling a paradigm shift in computing, away from a corporate network centric model with Windows end-point devices to what we called in this manuscript the Circa 2020 Computing Model. In the circa 2020 Computing model applications and data reside in the Cloud, the concept of an extended Trust Domain (network) disappears there is no corporate network, and finally the end-point device is a SmartPhone owned and operated by employees Bring Your Own Device (BYOD). In such an environment, the end-point device is not "Trusted", and there is a high likelihood that the BYOD can be used as a channel to leak sensitive data. In this manuscript, we present a new mechanism to prevent such a situation. We called this mechanism "TrustDroid TM ". TrustDroid TM is a static analyzer based on taint tracking that can be used to prevent leakage of sensitive information by an un-trusted Android SmartPhone.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

GPU Taint Tracking

Dynamic tainting tracks the influence of certain inputs (taint sources) through execution and it is a powerful tool for information flow analysis and security. Taint tracking has primarily targeted CPU program executions. Motivated by recent recognition of information leaking in GPU memory and GPU-resident malware, this paper presents the first design and prototype implementation of a taint tra...

متن کامل

Détection de flux de contrôle illégaux dans les Smartphones

Security in embedded systems such as smartphones requires protection of private data manipulated by third-party applications. Many mechanisms use dynamic taint analysis techniques for tracking information flow in software. But these techniques cannot detect control flows that use conditionals to implicitly transfer information from objects to other objects. In particular, malicious applications...

متن کامل

Detecting Control Flow in Smarphones: Combining Static and Dynamic Analyses

Security in embedded systems such as smartphones requires protection of confidential data and applications. Many of security mechanisms use dynamic taint analysis techniques for tracking information flow in software. But these techniques cannot detect control flows that use conditionals to implicitly transfer information from objects to other objects. In particular, malicious applications can b...

متن کامل

Blocking Short-Wavelength Component of the Visible Light Emitted by Smartphones’ Screens Improves Human Sleep Quality

Background: It has been shown that short-wavelength blue component of the visible light spectrum can alter the circadian rhythm and suppress the level of melatonin hormone. The short-wavelength light emitted by smartphones’ screens can affect the sleep quality of the people who use these devices at night through suppression of melatonin.Objectives: In this study, we examined the effects of co...

متن کامل

Identifying Requirements of a Self-care System on Smartphones for Preventing Coronavirus Disease 2019 (COVID-19)

Background: Smartphone applications play a pivotal role in management, providing care and preventing infectious diseases. It also has the potential impact on supportive and self-care. This study aimed to identify the requirements for a smartphones self-care system to prevent corona-virus (COVID-19). Materials & Methods: This was a descriptive study performed in two main stages in 2020. At the ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012