Detection of Side Channel Attacks Based on Data Tainting in Android Systems

@inproceedings{Graa2017DetectionOS,
  title={Detection of Side Channel Attacks Based on Data Tainting in Android Systems},
  author={Mariem Graa and Nora Cuppens-Boulahia and Fr{\'e}d{\'e}ric Cuppens and Jean-Louis Lanet and Routa Moussaileb},
  booktitle={SEC},
  year={2017}
}
Malicious third-party applications can leak personal data stored in the Android system by exploiting side channels. TaintDroid uses a dynamic taint analysis mechanism to control the manipulation of private data by third-party apps. However, TaintDroid does not propagate taint in side channels. An attacker can exploit this limitation to get private data. For example, Sarwar et al. present side channel class of attacks using a medium that might be overlooked by the taint-checking mechanism to… CONTINUE READING

Citations

Publications citing this paper.

A Context-Perceptual Privacy Protection Approach on Android Devices

  • 2018 IEEE International Conference on Communications (ICC)
  • 2018
VIEW 1 EXCERPT
CITES METHODS

References

Publications referenced by this paper.
SHOWING 1-10 OF 17 REFERENCES

On the effectiveness of dynamic taint analysis for protecting against private information leaks on androidbased devices

G. S. Babil, O. Mehani, R. Boreli, M. A. Kaafar
  • 2013 International Conference on Security and Cryptography (SECRYPT), pp. 1–8. IEEE
  • 2013
VIEW 7 EXCERPTS
HIGHLY INFLUENTIAL

Protection against Code Obfuscation Attacks Based on Control Dependencies in Android Systems

  • 2014 IEEE Eighth International Conference on Software Security and Reliability-Companion
  • 2014
VIEW 3 EXCERPTS
HIGHLY INFLUENTIAL

Similar Papers

Loading similar papers…