Skip to main content

2018 | Supplement | Buchkapitel

Evading Tainting Analysis of DroidBox by Using Image Difference Between Screen Capture Images

verfasst von : Dae-Boo Jeong, Man-Hee Lee

Erschienen in: IT Convergence and Security 2017

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Protecting personal and business data stored in smart phones from information leaking applications becomes very important. To detect such apps as early as possible, the data tracking functionality, called tainting analysis, is being utilized in many areas, and DroidBox with TaintDroid is one of the most frequently used dynamic analysis tools for Android system emulation. In this study, we showed a simple steganographic technique utilizing two consecutive screen captures so that TaintDroid or smartphone users cannot track or detect.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: an informatin-flow tracking system for realtime privacy monitoring on smartphones. OSDI 10, 255–270 (2010) Enck, W., Gilbert, P., Chun, B.-G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: TaintDroid: an informatin-flow tracking system for realtime privacy monitoring on smartphones. OSDI 10, 255–270 (2010)
3.
Zurück zum Zitat Sarwar, G., Mehani, O., Boreli, R., Ali Kaafar, M.: On the effectiveness of dynamic taint analysis for protecting against private information leaks on android-based devices. NICTA Technical report RT-7091 (2013) Sarwar, G., Mehani, O., Boreli, R., Ali Kaafar, M.: On the effectiveness of dynamic taint analysis for protecting against private information leaks on android-based devices. NICTA Technical report RT-7091 (2013)
5.
Zurück zum Zitat Lantz, P.: Droidbox - android application sandbox, February 2011 Lantz, P.: Droidbox - android application sandbox, February 2011
6.
Zurück zum Zitat Shuba, A., Le, A., Gjoka, M., Varmarken, J., Langhoff, S., Markopoulou, A.: Demo: AntMonitor: a system for mobile traffic monitoring and real-time prevention of privacy leaks. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, Paris, France, 7–11 September 2015 Shuba, A., Le, A., Gjoka, M., Varmarken, J., Langhoff, S., Markopoulou, A.: Demo: AntMonitor: a system for mobile traffic monitoring and real-time prevention of privacy leaks. In: Proceedings of the 21st Annual International Conference on Mobile Computing and Networking, Paris, France, 7–11 September 2015
7.
Zurück zum Zitat Kim, Y.-K., Yoon, H.-J., Lee, M.-H.: Stealthy information leakage from android smartphone through screenshot and OCR. In: International Conference on Chemical, Material and Food Engineering, August 2015 Kim, Y.-K., Yoon, H.-J., Lee, M.-H.: Stealthy information leakage from android smartphone through screenshot and OCR. In: International Conference on Chemical, Material and Food Engineering, August 2015
8.
Zurück zum Zitat Song, Y., Hengartner, U.: PrivacyGuard: a VPN-based platform to detect information leakage on android devices. In: Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, Denver, Colorado, USA, 12 October 2015 Song, Y., Hengartner, U.: PrivacyGuard: a VPN-based platform to detect information leakage on android devices. In: Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, Denver, Colorado, USA, 12 October 2015
9.
Zurück zum Zitat Canfora, G., Medvet, E., Mercaldo, F., Visaggio, C.A.: Acquiring and analyzing app metrics for effective mobile malware detection. In: Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, New Orleans, Louisiana, USA, 11 March 2016 Canfora, G., Medvet, E., Mercaldo, F., Visaggio, C.A.: Acquiring and analyzing app metrics for effective mobile malware detection. In: Proceedings of the 2016 ACM on International Workshop on Security And Privacy Analytics, New Orleans, Louisiana, USA, 11 March 2016
10.
Zurück zum Zitat Cavallaro, L., Saxena, P., Sekar, R.: AntiTaint-analysis: practical evasion techniques against information flow based malware defense. Stony Brook Computer Sclence Dept, November 2007 Cavallaro, L., Saxena, P., Sekar, R.: AntiTaint-analysis: practical evasion techniques against information flow based malware defense. Stony Brook Computer Sclence Dept, November 2007
11.
Zurück zum Zitat Cavallaro, L., Saxena, P., Sekar, R.: On the limits of information flow techniques for malware analysis and containment. In: Lecture Notes in Computer Science, July 2008 Cavallaro, L., Saxena, P., Sekar, R.: On the limits of information flow techniques for malware analysis and containment. In: Lecture Notes in Computer Science, July 2008
Metadaten
Titel
Evading Tainting Analysis of DroidBox by Using Image Difference Between Screen Capture Images
verfasst von
Dae-Boo Jeong
Man-Hee Lee
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-6454-8_23