to be effective in detecting privacy leaks in malicious
applications written with the expectation of such close
scrutiny in the context of Android architecture. In-
deed, the malware developer can use easy program-
matic constructs in the code, enabling the removal of
taint marks without losing the information.
We have provided the algorithms for a number
of different attacks, and evaluated their performance
on the Android platform with the TaintDroid patch.
Though only a few lines of code each, they were
shown to be sufficient to completely bypass Taint-
Droid, and allow silent leaking of sensitive informa-
tion. While some of the attacks were targeting self-
reported limitations of TaintDroid, which can be cor-
rected by new versions, others have highlighted an
essential problem of using taint analysis against the
developer of the code under study.
REFERENCES
(2011). Understanding Carrier IQ technology. White paper,
Carrier IQ.
(2012). perlsec - Perl security.
Cavallaro, L., Saxena, P., and Sekar, R. (2007). Anti-taint-
analysis: Practical evasion techniques against infor-
mation flow based malware defense. Technical report,
Stony Brook University.
Cavallaro, L., Saxena, P., and Sekar, R. (2008). On the lim-
its of information flow techniques for malware analy-
sis and containment detection of intrusions and mal-
ware, and vulnerability assessment. In DIMVA 2008,
chapter 8.
Chow, J., Pfaff, B., Garfinkel, T., Christopher, K., and
Rosenblum, M. (2004). Understanding data lifetime
via whole system simulation. In Security 2004.
Clause, J., Li, W., and Orso, A. (2007). Dytan: a generic
dynamic taint analysis framework. In ISTA 2007.
Egele, M., Kruegel, C., Kirda, E., and Vigna, G. (2011).
PiOS: Detecting privacy leaks in iOS applications. In
NDSS 2011.
Enck, W., Gilbert, P., Chun, B.-G., Cox, L. P., Jung, J., Mc-
Daniel, P., and Sheth, A. N. (2012). TaintDroid: An
information-flow tracking system for realtime privacy
monitoring on smartphones. In OSDI 2010.
Felt, A. P., Chin, E., Hanna, S., Song, D., and Wagner, D.
(2011). Android permissions demystified. In CCS
2011.
Felt, A. P., Ha, E., Egelman, S., Haney, A., Chin, E., and
Wagner, D. (2012). Android permissions: User atten-
tion, comprehension, and behavior. In SOUPS 2012.
Gilbert, P., Chun, B. G., Cox, L. P., and Jung, J. (2011).
Vision: Automated security validation of mobile apps
at app markets. In MCS 2011.
Google Inc. (2012). Android Java New I/O interface. An-
droid 4.2 r1.
Graa, M., Cuppens-Boulahia, N., Cuppens, F., and Cav-
alli, A. (2012). Detecting control flow in smarphones:
Combining static and dynamic analyses. In CCS 2012.
Grace, M. C., Zhou, W., Jiang, X., and Sadeghi, A.-R.
(2012). Unsafe exposure analysis of mobile in-app
advertisements. In WiSec 2012.
Ho, A., Fetterman, M., Clark, C., Warfield, A., and Hand, S.
(2006). Practical taint-based protection using demand
emulation. In EuroSys 2006.
Hornyack, P., Han, S., Jung, J., Schechter, S., and Wether-
all, D. (2011). “These aren’t the droids you’re looking
for:” retrofitting Android to protect data from imperi-
ous applications. In CCS 2011.
Kang, M. G., McCamant, S., Poosankam, P., and Ong, D.
(2011). DTA++: Dynamic taint analysis with targeted
control-flow propagation. In NDSS 2011.
Newsome, J. and Song, D. (2005). Dynamic taint analysis
for automatic detection, analysis, and signature gen-
eration of exploits on commodity software. In NDSS
2005.
Russello, G., Conti, M., Crispo, B., and Fernandes, E.
(2012). MOSES: Supporting operation modes on
smartphones. In SACMAT 2012.
Schwartz, E. J., Avgerinos, T., and Brumley, D. (2010). All
you ever wanted to know about dynamic taint analysis
and forward symbolic execution (but might have been
afraid to ask). In SP 2010.
Thomas, D. and Hunt, A. (2001). Locking Ruby in the Safe,
chapter 20.
Yin, H., Song, D., Egele, M., Kruegel, C., and Kirda, E.
(2007). Panorama: Capturing system-wide informa-
tion flow for malware detection and analysis. In CCS
2007.
SECRYPT2013-InternationalConferenceonSecurityandCryptography
468