TAINTMINI: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis

被引:7
|
作者
Wang, Chao [1 ]
Ko, Ronny [1 ]
Zhang, Yue [1 ]
Yang, Yuqing [1 ]
Lin, Zhiqiang [1 ]
机构
[1] Ohio State Univ, Columbus, OH 43210 USA
关键词
Mini-programs; Taint analysis; Privacy leaks detection; Security; Empirical Study;
D O I
10.1109/ICSE48619.2023.00086
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Mini-programs, which are programs running inside mobile super apps such as WeChat, often have access to privacy-sensitive information, such as location data and phone numbers, through APIs provided by the super apps. This access poses a risk of privacy sensitive data leaks, either accidentally from carelessly programmed mini-programs or intentionally from malicious ones. To address this concern, it is crucial to track the flow of sensitive data in mini-programs for either human analysis or automated tools. Although existing taint analysis techniques have been widely studied, they face unique challenges in tracking sensitive data flows in mini-programs, such as cross-language, cross-page, and cross-mini-program data flows. This paper presents a novel framework, TAINTMINI, which addresses these challenges by using a novel universal data flow graph approach that captures data flows within and across mini-programs. We have evaluated TAINTMINI with 238,866 mini-programs and detect 27,184 that contain sensitive data flows. We have also applied TAINTMINI to detect privacy leakage colluding mini-programs and identify 455 such programs from them that clearly violate privacy policy.
引用
收藏
页码:932 / 944
页数:13
相关论文
共 50 条
  • [41] STATIC SCHEDULING OF SYNCHRONOUS DATA FLOW PROGRAMS FOR DIGITAL SIGNAL-PROCESSING
    LEE, EA
    MESSERSCHMITT, DG
    IEEE TRANSACTIONS ON COMPUTERS, 1987, 36 (01) : 24 - 35
  • [42] STATIC SCHEDULING OF SYNCHRONOUS DATA FLOW PROGRAMS FOR DIGITAL SIGNAL PROCESSING.
    Lee, Edward Ashford
    Messerschmitt, David G.
    IEEE Transactions on Computers, 1987, C-36 (01) : 24 - 35
  • [43] Interactive Sensitive Data Exposure Detection Through Static Analysis
    Obaida, Md A.
    Nelson, Eric
    Ee, Rene V.
    Jahan, Israt
    Sajal, Sayeed Z.
    2017 IEEE INTERNATIONAL CONFERENCE ON ELECTRO INFORMATION TECHNOLOGY (EIT), 2017, : 270 - 275
  • [44] Detecting and Removing Web Application Vulnerabilities with Static Analysis and Data Mining
    Medeiros, Iberia
    Neves, Nuno
    Correia, Miguel
    IEEE TRANSACTIONS ON RELIABILITY, 2016, 65 (01) : 54 - 69
  • [45] Detecting data concealment programs using passive file system analysis
    Davis, M.
    Kennedy, R.
    Pyles, K.
    Strickler, A.
    Shenoi, S.
    ADVANCES IN DIGITAL FORENSICS II, 2006, 222 : 171 - +
  • [46] Static Privacy Analysis by Flow Reconstruction of Tainted Data
    Ferrara, Pietro
    Olivieri, Luca
    Spoto, Fausto
    INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2021, 31 (07) : 973 - 1016
  • [47] Static Loop Bound Analysis of C Programs Based on Flow Analysis and Abstract Interpretation
    de Michiel, Marianne
    Bonenfant, Armelle
    Casse, Hugues
    Sainrat, Pascal
    RTCSA 2008: 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED AND REAL-TIME COMPUTING SYSTEMS AND APPLICATIONS - PROCEEDINGS, 2008, : 161 - +
  • [48] Dynamic vs. Static Flow-Sensitive Security Analysis
    Russo, Alejandro
    Sabelfeld, Andrei
    2010 23RD IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF), 2010, : 186 - 199
  • [49] ON THE COMPLEXITY OF DATA-FLOW ANALYSIS OF LOGIC PROGRAMS
    DEBRAY, SK
    ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1995, 17 (02): : 331 - 365
  • [50] EFFICIENT DATA-FLOW ANALYSIS OF LOGIC PROGRAMS
    DEBRAY, SK
    JOURNAL OF THE ACM, 1992, 39 (04) : 949 - 984