thin hypervisor with an embedded emulator for the
Intel architecture. We showed that PDIFT has better
performance than previous solutions. We believe that
PDIFT can form the basis for the native DIFT on An-
droid platforms, thus providing a complete solution
for the DIFT problem in these environments.
REFERENCES
Bellard, F. (2005). Qemu, a fast and portable dynamic
translator. In USENIX annual technical conference,
FREENIX Track, volume 41, pages 10–5555. Califor-
nia, USA.
Bornstein, D. (2008). Dalvik vm internals. In Google I/O
developer conference, volume 23, pages 17–30.
Chen, K., Guo, X., Deng, Q., and Jin, Y. (2021). Dynamic
information flow tracking: Taxonomy, challenges, and
opportunities. Micromachines, 12(8):898.
Chen, S., Kozuch, M., Strigkos, T., Falsafi, B., Gibbons,
P. B., Mowry, T. C., Ramachandran, V., Ruwase, O.,
Ryan, M., and Vlachos, E. (2008). Flexible hard-
ware acceleration for instruction-grain program moni-
toring. ACM SIGARCH Computer Architecture News,
36(3):377–388.
Das, D., Bose, P., Machiry, A., Mariani, S., Shoshitaishvili,
Y., Vigna, G., and Kruegel, C. (2022). Hybrid prun-
ing: Towards precise pointer and taint analysis. In In-
ternational Conference on Detection of Intrusions and
Malware, and Vulnerability Assessment, pages 1–22.
Springer.
Deshane, T., Shepherd, Z., Matthews, J., Ben-Yehuda, M.,
Shah, A., and Rao, B. (2008). Quantitative compari-
son of Xen and KVM. Xen Summit, Boston, MA, USA,
pages 1–2.
Enck, W., Gilbert, P., Han, S., Tendulkar, V., Chun, B.-
G., Cox, L. P., Jung, J., McDaniel, P., and Sheth,
A. N. (2014). Taintdroid: an information-flow track-
ing system for realtime privacy monitoring on smart-
phones. ACM Transactions on Computer Systems
(TOCS), 32(2):1–29.
Ho, A., Fetterman, M., Clark, C., Warfield, A., and Hand,
S. (2006). Practical taint-based protection using de-
mand emulation. In Proceedings of the 1st ACM
SIGOPS/EuroSys European Conference on Computer
Systems 2006, pages 29–41.
Kemerlis, V. P., Portokalidis, G., Jee, K., and Keromytis,
A. D. (2012). libdft: Practical dynamic data flow
tracking for commodity systems. In Proceedings of
the 8th ACM SIGPLAN/SIGOPS conference on Vir-
tual Execution Environments, pages 121–132.
Kiperberg, M. (2021). Preventing malicious communica-
tion using virtualization. Journal of Information Se-
curity and Applications, 61:102871.
Kiperberg, M., Yehuda, R. B., and Zaidenberg, N. J. (2020).
Hyperwall: A hypervisor for detection and prevention
of malicious communication. In International Confer-
ence on Network and System Security, pages 79–93.
Springer.
Lawton, K. P. (1996). Bochs: A portable pc emulator for
unix/x. Linux Journal, 1996(29es):7–es.
Leon, R. S., Kiperberg, M., Zabag, A. A. L., Resh, A., Al-
gawi, A., and Zaidenberg, N. J. (2019). Hypervisor-
based white listing of executables. IEEE Security &
Privacy, 17(5):58–67.
Machiry, A. (2017). The need for extensible and config-
urable static taint tracking for c/c++. https://machiry:
github:io/blog/2017/05/31/static-taint-tracking.
Oracle (Accessed Nov. 2022). VirtualBox. https://www.
virtualbox.org/.
Seshadri, A., Luk, M., Qu, N., and Perrig, A. (2007).
Secvisor: A tiny hypervisor to provide lifetime ker-
nel code integrity for commodity oses. In Proceedings
of twenty-first ACM SIGOPS symposium on Operating
systems principles, pages 335–350.
Shinagawa, T., Eiraku, H., Tanimoto, K., Omote, K.,
Hasegawa, S., Horie, T., Hirano, M., Kourai, K.,
Oyama, Y., Kawai, E., et al. (2009). Bitvisor: a
thin hypervisor for enforcing i/o device security. In
Proceedings of the 2009 ACM SIGPLAN/SIGOPS in-
ternational conference on Virtual execution environ-
ments, pages 121–130.
Sibai, F. N. (2008). Evaluating the performance of sin-
gle and multiple core processors with PCMARK® 05
and benchmark analysis. ACM SIGMETRICS Perfor-
mance Evaluation Review, 35(4):62–71.
Slowinska, A. and Bos, H. (2009). Pointless tainting? eval-
uating the practicality of pointer tainting. In Proceed-
ings of the 4th ACM European conference on Com-
puter systems, pages 61–74.
Venkataramani, G., Doudalis, I., Solihin, Y., and Prvulovic,
M. (2008). Flexitaint: A programmable accelerator
for dynamic taint propagation. In 2008 IEEE 14th
International Symposium on High Performance Com-
puter Architecture, pages 173–184. IEEE.
VMware (Accessed Nov. 2022a). VMware ESXi. https:
//www.vmware.com/il/products/esxi-and-esx.html.
VMware (Accessed Nov. 2022b). VMware Work-
station Pro. https://www.vmware.com/products/
workstation-pro.html.
wfeldt (2022). libx86emu. https://github.com/wfeldt/
libx86emu.
Xue, L., Qian, C., Zhou, H., Luo, X., Zhou, Y., Shao, Y.,
and Chan, A. T. (2018). Ndroid: Toward tracking
information flows across multiple android contexts.
IEEE Transactions on Information Forensics and Se-
curity, 14(3):814–828.
Yan, L. K. and Yin, H. (2012). {DroidScope}: Seam-
lessly reconstructing the {OS} and dalvik semantic
views for dynamic android malware analysis. In 21st
USENIX security symposium (USENIX security 12),
pages 569–584.
You, I. and Yim, K. (2010). Malware obfuscation tech-
niques: A brief survey. In 2010 International con-
ference on broadband, wireless computing, communi-
cation and applications, pages 297–300. IEEE.
Zimmer, R. (2009). Hale,“UEFI: From Reset Vector to Op-
erating System,” Chapter 3 of Hardware-Dependent
Software.
ICISSP 2023 - 9th International Conference on Information Systems Security and Privacy
198