DCert: Find the Leak in Your Pocket

08/03/2018
by   Mohamed Nassim Seghir, et al.
0

Static data-flow analysis has proven its effectiveness in assessing security of applications. One major challenge it faces is scalability to large software. This issue is even exacerbated when additional limitations on computing and storage resources are imposed, as is the case for mobile devices. In such cases the analysis is performed on a conventional computer. This poses two problems. First, a man-in-the-middle attack can tamper with an analyzed application. So once on the mobile device, what guarantees that the actual version is not corrupt. Second, the analysis itself might be broken leading to an erroneous result. As a solution, we present DCert a tool for checking and certifying data-flow properties that consists of two components: a (heavy- weight) analyzer and a (lightweight) checker. The analyzer is deployed on a conventional computer. It verifies the conformance of a given application to a specified policy and generates a certificate attesting the validity of the analysis result. It suffices then for the checker, on a mobile device, to perform a linear pass in the application size to validate or refute the certificate as well as the policy. This allows us to separate the verification and the checking process while ensuring a trust relationship between them via the certificate. We describe DCert and report on experimental results obtained for real-world applications.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/03/2018

Certificate Enhanced Data-Flow Analysis

Proof-carrying-code was proposed as a solution to ensure a trust relatio...
research
06/14/2023

SWAM: Revisiting Swap and OOMK for Improving Application Responsiveness on Mobile Devices

Existing memory reclamation policies on mobile devices may be no longer ...
research
09/16/2010

CloneCloud: Boosting Mobile Device Applications Through Cloud Clone Execution

Mobile applications are becoming increasingly ubiquitous and provide eve...
research
08/11/2018

Attacks Against BLE Devices by Co-located Mobile Applications

Bluetooth Low Energy (BLE) is a fast-growing wireless technology with a ...
research
03/30/2022

The Block-based Mobile PDE Systems Are Not Secure – Experimental Attacks

Nowadays, mobile devices have been used broadly to store and process sen...
research
12/14/2019

Conquering the Extensional Scalability Problem for Value-Flow Analysis Frameworks

With an increasing number of value-flow properties to check, existing st...
research
05/16/2022

Switch as a Verifier: Toward Scalable Data Plane Checking via Distributed, On-Device Verification

Data plane verification (DPV) is important for finding network errors. C...

Please sign up or login with your details

Forgot password? Click here to reset