Promoted
Promoted

Review of Enck et al., TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

Topic: Security

This paper addresses the problem of smartphone users regarding adequate control over and visibility into how third-party applications use their private data.

Overview

0heading

TaintDroid is a system-wide integration of taint tracking into the Android platform. It works better because of variable tracking throughout Dalvik VM environment, patches state after native method invocation, and tracking extended between applications and to storage. In the paper, the authors modified the Dalvik VM interpreter to store and propagate taint tags that are, a taint bit-vector on variables. Taindroid tracking works by identifying sources of information and sinks where the information leaves the device. Tainted information is tracked using taint tags which are stored adjacent to the tainted variable using properties of the Dalvik VM.

1paragraph

Strengths

2heading

Taintdroid provides efficient, system-wide, dynamic taint tracking and analysis for Android. It identifies vulnerabilities in a runtime environment. It takes 4 granularities of taint propagations into account: variable-level, message-level, method-level, file-level. Taintdroid had 14% performance overhead on CPU-bound micro bench and 3.5% memory overhead which is small considering the storage of taint tags. Taintdroid is open source which makes it available for research and more improvement. The authors updated their firmware to support Android 4.3 that shows this research is live.

3paragraph

Weakness

4heading

Taintdroid has approach limitations. Firstly Taintdroid only tracks data flows i.e. explicit flows making it circumventable. The malicious application can create problems and exfiltrate privacy-sensitive information through control flow. Taintdroid likely to cause false positives. The network is only considered as the sink. Sensitive information can propagate back from the network. It is implemented at the firmware level and is not an application. In order to run it, one has to download and install a new or custom Android image which is too complicated for the end-user. Taintdroid did not monitor all methods available. Only 913 out of 2844 JNI methods. The remaining 1931 methods were unmonitored. Native code is left unmonitored. Lack of evaluation data on power consumption.

5paragraph

Future Work

6heading

Promoted
Promoted

The future direction for traindroid could be more real-time tracking, enforcement, and filtering. Integrating with the expert rating system and providing direct feedback to users in form of notifications. Eliminating or reducing false positives through better management of variable-level tags. It can use source code analysis to monitor the flow of all 2844 JNI methods in Android.

7paragraph