{FlowFence}: Practical data protection for emerging {IoT} application frameworks

E Fernandes, J Paupore, A Rahmati… - 25th USENIX security …, 2016 - usenix.org
Emerging IoT programming frameworks enable building apps that compute on sensitive
data produced by smart homes and wearables. However, these frameworks only support …

Towards {Privacy-Preserving}{Social-Media}{SDKs} on Android

H Lu, Y Liu, X Liao, L Xing - 33rd USENIX Security Symposium (USENIX …, 2024 - usenix.org
Integration of third-party SDKs are essential in the development of mobile apps. However,
the rise of in-app privacy threat against mobile SDKs—called cross-library data harvesting …

T2Droid: A TrustZone-based dynamic analyser for Android applications

SD Yalew, GQ Maguire, S Haridi… - 2017 ieee trustcom …, 2017 - ieeexplore.ieee.org
Android has become the most widely used mobile operating system (OS) in recent years.
There is much research on methods for detecting malicious Android applications. Dynamic …

Triflow: Triaging android applications using speculative information flows

O Mirzaei, G Suarez-Tangil, J Tapiador… - Proceedings of the …, 2017 - dl.acm.org
Information flows in Android can be effectively used to give an informative summary of an
application's behavior, showing how and for what purpose apps use specific pieces of …

FloVasion: towards detection of non-sensitive variable based evasive information-flow in android apps

B Buddhadev, P Faruki, MS Gaur… - IETE Journal of …, 2022 - Taylor & Francis
Smartphones are enriched by applications (apps) available through the mobile ecosystem.
Various studies have reported that apps leaking sensitive user and device information are …

A dynamic taint analysis framework based on entity equipment

Y Ren, W Dong, J Lin, X Miao - IEEE Access, 2019 - ieeexplore.ieee.org
With the development of the Internet of Things, the security of embedded device has
received extensive attention. Taint analysis technology can improve the understanding of …

Latch: A locality-aware taint checker

D Townley, KN Khasawneh, D Ponomarev… - Proceedings of the …, 2019 - dl.acm.org
We present LATCH (short for Locality-Aware Taint CHecker), a generalizable architecture for
optimizing dynamic information flow tracking (DIFT). LATCH exploits the observation that …

Dynamic Possible Source Count Analysis for Data Leakage Prevention

E Ogawa, T Yamazaki, R Shioya - Proceedings of the 21st ACM …, 2024 - dl.acm.org
Dynamic Taint Analysis (DTA) is a widely studied technique that can effectively detect
various attacks and information leakage. In the context of detecting information leakage, taint …

知识, 探索与状态平面组织的软件漏洞分析架构研究

袁子牧, 肖扬, 吴炜, 霍玮, 邹维 - 信息安全学报, 2019 - jcs.iie.ac.cn
对于软件漏洞分析复杂度过高的现状问题, 本文认为其主要原因在于当前软件分析知识,
技术及数据耦合程度高, 各类知识与技术间缺乏有效编程接口连接, 因而提出了将软件漏洞分析 …

[引用][C] Principle and practice of taint analysis

王蕾, 李丰, 李炼, 冯晓兵 - Journal of Software, 2017