题名

雲端應用程式資訊流動之動態污點傳播分析

作者

王平;林文暉;趙文傑

关键词

污點檢驗 ; 行動安全 ; 動態汙點傳播 ; 加權生成樹

期刊名称

資訊安全通訊

卷期/出版年月

21卷2期(2015 / 04 / 01)

页次

1 - 20

内容语文

繁體中文

中文摘要

現有大多數的惡意程式威脅分析涉及主機安全漏洞分析與發現網路攻擊有關的安全漏洞。近期雲端服務供應商(Cloud service provider,CSP)採用汙點檢驗(Taint checking,TC)作為應用服務上架前之檢測方法,以確保用戶之資訊安全。針對此一議題,本研究提出一以動態污點追踪方法,假設在開放式的行動網路下,隨意選擇惡意程式(汙染源)與系統漏洞(受害端)假設下,以檢測資訊汙染源與特定的手機應用程式及雲端服務漏洞之間的資訊流的污點傳播的行為與範圍。本文針對雲端應用程式提出一個資訊流之動態污點傳播分析模型,其整合加權生成樹(Weighted Spanning Tree)與污染標記(Taint marking)法以解決資安漏洞與動態污點追踪的問題;在測試案例中,以委託的三方開發之Android的應用程式執行汙點檢驗情境,分析手機應用程式、後台雲端服務內部模組與網路汙染源連線之資訊交換與風險。透過概率風險指標客觀評估每一可能的汙染路徑風險,協助防衛者評估惡意程式威脅的汙染範圍和估計造成的損失。經案例之污點路徑分析,所提的動態污點傳播分析模型可協助管理者提升網路安全的威脅分析之正確性。

主题分类 基礎與應用科學 > 資訊科學
参考文献
  1. 王平、林文暉、周宇軒、呂仁貴(2012)。雲端運算虛擬主機之攻擊模擬與分析。資訊安全通訊,19(2),1-16。
    連結:
  2. 陳嘉玫(2014)。以汙染傳遞為基礎之行動軟體威脅行為偵測。第六屆台灣區Botnet 偵測與防治技術研討會(BoT2014)
    連結:
  3. Valgrind, available at http://valgrind.org/docs/manual/dist.news.html (2014/11/25)
  4. TEMU, avaliable at http://bitblaze.cs.berkeley. edu/temu.html
  5. J. McClurg, J. Friedman, and W. Ng, Android Privacy Leak Detection via Dynamic Taint Analysis, EECS 450 (2013).
  6. Wikipedia, Spanning tree, available at: http://en.wikipedia.org/wiki/Spanning_tree,avaible at: http://en. wikipedia.org/ wiki/Taint_checking. (2014/12/12)
  7. Wikipedia, taint checking, available at: http://en.wikipedia.org/wiki/Taint_checking.(2014/12/12)
  8. 梁光成 , 動態污點分析淺述, 2012 年12 月, available at: http://blog. sina.com.cn/s/blog_a3e16b1101017hf8.html
  9. Honeynet project (2012), DroidBox. available at http://www.honeynet.org/gsoc/ slot11.(2014/10/15)
  10. A. Desnos, Androguard, avaliable at http://code.google.com/p/androguard/ wiki/Usage.(2014/10/7)
  11. Balakrishnan, G.,Reps, T.(2010).WYSINWYX: What you see is not what you eXecute.ACM Transactions on Programming Languages and Systems (TOPLAS),32(6),1-84.
  12. Chad, W. A.,Bamshad, M.,Robin, B.(2007).Defending recommender systems: detection of profile injection attacks.Service Oriented Computing and Applications,1(3),157-170.
  13. Chin, E.,Felt, A. P.,Greenwood, K.,Wagner, D.(2011).Analyzing Inter-Application Communication in Android.Proceedings of the 9th international conference on Mobile systems (MobiSys2011)
  14. Kim, H.C.,Keromytis, A.D.,Covington, M.,Sahita, R.(2009).Capturing Information Flow with Concatenated Dynamic Taint Analysis.Proceedings: International Conference on Availability, Reliability and Security
  15. Mannila, H.,Toivonen, H.,Verkamo, I.A.(1997).Discovery of frequent episodes in event sequences.Data Mining and Knowledge Discovery,1(3),259-289.
  16. Newsome, J.,Song, D.(2005).Dynamic Taint Analysis for Automatic Detection, Analysis,and Signature Generation of Exploits on Commodity Software.Proceedings of the 12th Annual Network and Distributed System Security Symposium (NDSS '05)
  17. Portokalidis, G.,Slowinska, A.,Bos, H.(2006).Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation.SIGOPS Oper. Syst. Rev.,40(4)
  18. Rastogi, V.,Chen, Y.,Enck, W.(2013).AppsPlayground: automatic security analysis of smartphone application.Proceedings of the third ACM conference on Data and application security and privacy (CODASPY13)
  19. Tripp, O.,Pistoia, M.,Fink, S. J.,Sridharan, M.,Weisman, O.(2009).TAJ: effective taint analysis of web applications.Conference on Programming language design and implementation
  20. Tsai, W. T.,Wei, X.,Chen, Y.,Paul, R.,Chung, J.Y.,Zhang, D.(2007).Data provenance in SOA: security, reliability, and integrity.Service Oriented Computing and Applications,1(4),223-247.
  21. Wang, P.,Chao, K.M.,Lo, C.C.,Chao, W.J.(2014).Using Taint Propagation Checking for Threat Analysis of Cloud Services.IEEE International Conference on e-Business Engineering
  22. Yin, H.,Song, D.,Egele, M.,Kruegel, C.,Kirda, E.(2007).Panorama: capturing system wide information flow for malware detection and analysis.Proceedings of the 14th ACM Conference on Computer and Communications Security
  23. 王鐵磊(2011)。博士論文(博士論文)。北京大學信息科技技術學院。
  24. 任霏霏、莊洪林、吳理發、潘璠(2013)。跨主機動態污點跟踪技術研究。計算機工程,39(3)
  25. 項國富、金海、鄒德清、陳學廣(2012)。基於虛擬化的安全監控。軟體學報,23(8),2173-2187。