Detecting control flow in smarphones: combining static and dynamic analyses

  • Authors:
  • Mariem Graa;Nora Cuppens-Boulahia;Frédéric Cuppens;Ana Cavalli

  • Affiliations:
  • Telecom-Bretagne, Cesson Sévigné, France, Telecom-SudParis, Evry, France;Telecom-Bretagne, Cesson Sévigné, France;Telecom-Bretagne, Cesson Sévigné, France;Telecom-SudParis, Evry, France

  • Venue:
  • CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Security in embedded systems such as smartphones requires protection of confidential data and applications. Many of security mechanisms use dynamic taint analysis techniques for tracking information flow in software. But these techniques cannot detect control flows that use conditionals to implicitly transfer information from objects to other objects. In particular, malicious applications can bypass Android system and get privacy sensitive information through control flows. We propose an enhancement of dynamic taint analysis that propagates taint along control dependencies by using the static analysis in embedded system such as Google Android operating system. By using this new approach, it becomes possible to protect sensitive information and detect most types of software exploits without reporting too many false positives.