Skip to main content

Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps

  • Conference paper
  • First Online:
Foundations and Practice of Security (FPS 2014)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8930))

Included in the following conference series:

Abstract

Today, security is a requirement for smartphone operating systems that are used to store and handle sensitive information. However, smartphone users usually download third-party applications that can leak personal data without user authorization. For this reason, the dynamic taint analysis mechanism is used to control the manipulation of private data by third-party apps [9]. But this technique does not detect control flows. In particular, untrusted applications can circumvent Android system and get privacy sensitive information through control flows. In this paper, we propose a hybrid approach that combines static and dynamic analysis to propagate taint along control dependencies in Android system. To evaluate the effectiveness of our approach, we analyse 27 free Android applications. We found that 14 of these applications use control flows to transfer sensitive data. We successfully detect that 8 of them leaked private information. Our approach creates 19 % performance overhead that is due to the propagation of taint in the control flow. By using our approach, it becomes possible to detect leakage of personal data through control flows.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Android. http://www.android.com/

  2. dex2jar. http://code.google.com/p/dex2jar/

  3. Java decompiler. http://jd.benow.ca/

  4. AT&T Research: Graphviz. http://www.graphviz.org/

  5. Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services. pp. 239–252. ACM (2011)

    Google Scholar 

  6. P.S. Corporation: Caffeinemark 3.0. http://www.benchmarkhq.ru/cm30/

  7. Denning, D.: Secure information flow in computer systems. Ph.D. thesis, Purdue University (1975)

    Google Scholar 

  8. Egele, M., Kruegel, C., Kirda, E., Vigna, G.: PiOS: detecting privacy leaks in iOS applications. In: Proceedings of the Network and Distributed System Security Symposium (2011)

    Google Scholar 

  9. Enck, W., Gilbert, P., Chun, B., Cox, L., Jung, J., McDaniel, P., Sheth, A.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation. pp. 1–6. USENIX Association (2010)

    Google Scholar 

  10. Fenton, J.: Memoryless subsystem. Comput. J. 17(2), 143–147 (1974)

    Article  MATH  MathSciNet  Google Scholar 

  11. Fuchs, A.P., Chaudhuri, A., Foster, J.S.: Scandroid: automated security certification of android applications. Manuscript, University of Maryland (2009). http://www.cs.umd.edu/~avik/projects/scandroidascaa

  12. Graa, M., Cuppens-Boulahia, N., Cuppens, F., Cavalli, A.: Detecting control flow in smarphones: combining static and dynamic analyses. In: Xiang, Y., Lopez, J., Jay Kuo, C.-C., Zhou, W. (eds.) CSS 2012. LNCS, vol. 7672, pp. 33–47. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  13. Graa, M., Cuppens-Boulahia, N., Cuppens, F., Cavalli, A.: Formal characterization of illegal control flow in android system. In: 9th International Conference on Signal Image Technology & Internet Systems (2013)

    Google Scholar 

  14. Graa, M., Cuppens-Boulahia, N., Cuppens, F., Cavalli, A.: Protection against Code obfuscation attacks based on control dependencies in android systems. In: 8th International Workshop on Trustworthy Computing (2014)

    Google Scholar 

  15. Hornyack, P., Han, S., Jung, J., Schechter, S., Wetherall, D.: These aren’t the droids you’re looking for: retrofitting android to protect data from imperious applications. In: Proceedings of the 18th ACM Conference on Computer and Communications Security, pp. 639–652. ACM (2011)

    Google Scholar 

  16. Kang, M., McCamant, S., Poosankam, P., Song, D.: Dta++: dynamic taint analysis with targeted control-flow propagation. In: Proceedings of the 18th Annual Network and Distributed System Security Symposium, San Diego, CA (2011)

    Google Scholar 

  17. Rob van der Meulen, J.R.: Gartner says smartphone sales accounted for 55 percent of overall mobile phone sales in third quarter of 2013 (2013). http://www.gartner.com/newsroom/id/2623415

  18. Nair, S., Simpson, P., Crispo, B., Tanenbaum, A.: A virtual machine based information flow control system for policy enforcement. Electron. Notes Theoret. Comput. Sci. 197(1), 3–16 (2008)

    Article  Google Scholar 

  19. News, B.: Bbc google activations and downloads update, May 2013. http://www.bbc.com/news/technology-22542725

  20. Song, D., Brumley, D., Yin, H., Caballero, J., Jager, I., Kang, M., Liang, Z., Newsome, J., Poosankam, P., Saxena, P.: Bitblaze: A new approach to computer security via binary analysis. In: Information Systems Security, pp. 1–25 (2008)

    Google Scholar 

  21. Wilson, T.: Many android apps leaking private information, July 2011. http://www.informationweek.com/security/mobile/many-android-apps-leaking-private-inform/231002162

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mariem Graa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Graa, M., Cuppens-Boulahia, N., Cuppens, F., Cavalli, A. (2015). Detection of Illegal Control Flow in Android System: Protecting Private Data Used by Smartphone Apps. In: Cuppens, F., Garcia-Alfaro, J., Zincir Heywood, N., Fong, P. (eds) Foundations and Practice of Security. FPS 2014. Lecture Notes in Computer Science(), vol 8930. Springer, Cham. https://doi.org/10.1007/978-3-319-17040-4_22

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-17040-4_22

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-17039-8

  • Online ISBN: 978-3-319-17040-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics