skip to main content
10.1145/2666620.2666626acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

LazyTainter: Memory-Efficient Taint Tracking in Managed Runtimes

Published:07 November 2014Publication History

ABSTRACT

The leakage of private information is of great concern on mobile devices since they contain a great deal of sensitive information. This has spurred interest in the use of taint tracking systems to track and monitor the flow of private information on a mobile device. Taint tracking systems impose memory overhead, as taint information must be maintained for every piece of information an application stores in memory. This memory cost is at odds with the growing number of low-end, memory-constrained devices, which makes up the majority mobile device growth in emerging markets. To make taint tracking affordable and to benefit a broader range of mobile devices, we present LazyTainter, which is a memory-efficient taint tracking system designed for managed runtimes. To implement LazyTainter, we enhanced TaintDroid with hybrid taint tracking, which combines lazy and eager tainting, to reduce memory usage with only negligible performance loss. Our experimental results demonstrate that LazyTainter can reduce heap usage by as much as 26.5% when compared to TaintDroid while imposing a negligible 1% increase in performance overhead.

References

  1. K. W. Y. Au, Y. F. Zhou, Z. Huang, and D. Lie. PScout: Analyzing the Android Permission Specification. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, pages 217--228, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. R. Balebako, J. Jung, W. Lu, L. F. Cranor, and C. Nguyen. "Little brothers watching you": Raising awareness of data leaks on smartphones. In L. Bauer, K. Beznosov, and L. F. Cranor, editors, SOUPS, page 12. ACM, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Bornstein. Dalvik VM Internals. https://sites.google.com/site/io/dalvik-vm-internals, 2008.Google ScholarGoogle Scholar
  4. D. Burke. Android 4.4 KitKat and Updated Developer Tools. http://android-developers.blogspot.ca/2013/10/android-44-kitkat-and-updated-developer.html, 2013.Google ScholarGoogle Scholar
  5. CaffeineMark 3.0. http://www.benchmarkhq.ru/cm30/.Google ScholarGoogle Scholar
  6. M. Dam, G. Le Guernic, and A. Lundblad. TreeDroid: A Tree Automaton Based Approach to Enforcing Data Processing Policies. In Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12, pages 894--905, New York, NY, USA, 2012. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Investigating Your RAM Usage. https://developer.android.com/tools/debugging/debugging-memory.html.Google ScholarGoogle Scholar
  8. V. Djeric and A. Goel. Securing Script-based Extensibility in Web Browsers. In Proceedings of the 19th USENIX Conference on Security, USENIX Security'10, pages 23--23, Berkeley, CA, USA, 2010. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10, pages 1--6, Berkeley, CA, USA, 2010. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Flurry Blog. http://blog.flurry.com/?Tag=UsageStatistics.Google ScholarGoogle Scholar
  11. A. Ho, M. Fetterman, C. Clark, A. Warfield, and S. Hand. Practical Taint-based Protection Using Demand Emulation. In Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006, EuroSys '06, pages 29--41, New York, NY, USA, 2006. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall. These Aren't the Droids You're Looking for: Retrofitting Android to Protect Data from Imperious Applications. In Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11, pages 639{652, New York, NY, USA, 2011. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. IDC Press Release. http://www.idc.com/getdoc.jsp? containerId=prUS24676414.Google ScholarGoogle Scholar
  14. Android Kitkat. http://developer.android.com/about/versions/kitkat.html.Google ScholarGoogle Scholar
  15. D. Lea. A Memory Allocator. http://g.oswego.edu/dl/html/malloc.html, 2000.Google ScholarGoogle Scholar
  16. B. Livshits. Dynamic Taint Tracking in Managed Run-times. Technical Report MSR-TR-2012--114, Microsoft Research, Nov 2012.Google ScholarGoogle Scholar
  17. B. Livshits and J. Jung. Automatic Mediation of Privacy-sensitive Resource Access in Smartphone Applications. In Proceedings of the 22Nd USENIX Conference on Security, SEC'13, pages 113--130, Berkeley, CA, USA, 2013. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Running Android with low RAM. http://source.android.com/devices/low-ram.html.Google ScholarGoogle Scholar
  19. J. Newsome. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proceedings of the Network and Distributed System Security Symposium (NDSS 2005), 2005.Google ScholarGoogle Scholar
  20. A. Nguyen-tuong, S. Guarnieri, D. Greene, J. Shirley, and D. Evans. Automatically Hardening Web Applications Using Precise Tainting. In In 20th IFIP International Information Security Conference, pages 372--382, 2005.Google ScholarGoogle Scholar
  21. D. Octeau, P. McDaniel, S. Jha, A. Bartel, E. Bodden, J. Klein, and Y. Le Traon. Effective Inter-component Communication Mapping in Android with Epicc: An Essential Step Towards Holistic Security Analysis. In Proceedings of the 22Nd USENIX Conference on Security, SEC'13, pages 543--558, Berkeley, CA, USA, 2013. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. P. Security Engineering Research Group, Institute of Management Sciences Peshawar. Analysis of Dalvik Virtual Machine and Class Path Library, 2009.Google ScholarGoogle Scholar
  23. G. E. Suh, J. W. Lee, D. Zhang, and S. Devadas. Secure Program Execution via Dynamic Information Flow Tracking. In Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS XI, pages 85--96, New York, NY, USA, 2004. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Y. Tang, P. Ames, S. Bhamidipati, A. Bijlani, R. Geambasu, and N. Sarda. CleanOS: Limiting Mobile Data Exposure with Idle Eviction. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI'12, pages 77--91, Berkeley, CA, USA, 2012. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. P. Vogt, F. Nentwich, N. Jovanovic, E. Kirda, C. Krügel, and G. Vigna. Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. In NDSS. The Internet Society, 2007.Google ScholarGoogle Scholar
  26. T.Wang, K. Lu, L. Lu, S. Chung, and W. Lee. Jekyll on iOS: When Benign Apps Become Evil. In Proceedings of the 22nd USENIX Conference on Security, SEC'13, pages 559--572, Berkeley, CA, USA, 2013. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks. In Proceedings of the 15th Conference on USENIX Security Symposium - Volume 15, USENIX-SS'06, Berkeley, CA, USA, 2006. USENIX Association. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda. Panorama: Capturing System-wide Information Flow for Malware Detection and Analysis. In Proceedings of the 14th ACM Conference on Computer and Communications Security, CCS '07, pages 116--127, New York, NY, USA, 2007. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. D. Y. Zhu, J. Jung, D. Song, T. Kohno, and D. Wether-all. TaintEraser: Protecting Sensitive Data Leaks Using Application-level Taint Tracking. SIGOPS Oper. Syst. Rev., 45(1):142--154, Feb. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. LazyTainter: Memory-Efficient Taint Tracking in Managed Runtimes

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SPSM '14: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices
        November 2014
        118 pages
        ISBN:9781450331555
        DOI:10.1145/2666620

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 7 November 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SPSM '14 Paper Acceptance Rate11of29submissions,38%Overall Acceptance Rate46of139submissions,33%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader