Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

(629.61KB)
This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Dynamic Taint Analysis Tools: A Review
Abdullah Mujawib Alashjaee, Salahaldeen Duraibi , Jia Song
Pages - 231 - 243     |    Revised - 30-11-2019     |    Published - 31-12-2019
Volume - 13   Issue - 6    |    Publication Date - December 2019  Table of Contents
MORE INFORMATION
KEYWORDS
Taint Analysis, Static Analysis, Dynamic Analysis.
ABSTRACT
Taint analysis is the trending approach of analysing software for security purposes. By using the taint analysis technique, tainted tags are added to the data entering from the sensitive sources into the applications, then the propagations of the tainted data are monitored carefully. Taint analysis can be done in two ways including static taint analysis where analysis is conducted without executing the program, and dynamic taint analysis where the tainted data is monitored during the program execution. This paper reviews the taint analysis technique, with a focus on dynamic taint analysis. In addition, some of the existing taint analysis tools and their application areas are reviewed. In the end, the paper summarises the defects associated with each of the tools and presents some of them.
1 refSeek 
2 BibSonomy 
3 Scribd 
4 SlideShare 
1 D Zou, J Zhao, W Li, Y Wu, W Qiang., "A Multigranularity Forensics and Analysis Method on Privacy Leakage in Cloud Environment." IEEE Internet of Things Journal, 2018. 6(2): p. 1484-1494.
2 A.N. Moussa, N. Ithnin, and A. Zainal, "CFaaS: bilaterally agreed evidence collection." Journal of Cloud Computing, 2018. 7(1): p. 1.
3 X. Meng, and B.P. Miller. "Binary code is not easy." in Proceedings of the 25th International Symposium on Software Testing and Analysis. 2016. ACM.
4 M. Shudrak, and V. Zolotarev. "The technique of dynamic binary analysis and its application in the information security sphere." in Eurocon 2013. 2013. IEEE.
5 C Chen, B Cui, J Ma, R Wu, J Guo, W Liu. "A systematic review of fuzzing techniques." Computers & Security, 2018. 75: p. 118-137.
6 R Baldoni, E Coppa, DC D'elia, C Demetrescu. "A survey of symbolic execution techniques." ACM Computing Surveys (CSUR), 2018. 51 (3): p. 50.
7 Z Feng, Z Wang, W Dong. "Bintaint: A STA Method for Binary Vulnerability Mining." in 2018 International Conference on Cloud Computing, Big Data and Blockchain (ICCBB). 2018. IEEE.
8 J Cai, P Zou, J Ma, J He. "Sworddta: A dynamic taint analysis tool for software vulnerability detection." Wuhan University Journal of Natural Sciences, 2016. 21(1): p. 10-20.
9 K. Liu, H.B.K. Tan, and X. Chen, "Binary code analysis. Computer," 2013. 46(8): p. 60-68.
10 C. Cadar, D. Dunbar, and D.R. Engler. "KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs." in OSDI. 2008.
11 W. Aman, "A framework for analysis and comparison of dynamic malware analysis tools." arXiv preprint arXiv:1410.2131, 2014.
12 J. Kim, T. Kim, and E.G. Im. "Survey of dynamic taint analysis." in 2014 4th IEEE International Conference on Network Infrastructure and Digital Content. 2014. IEEE.
13 E Zhu, X Li, F Liu, X Li, Z Ma. "Constructing a hybrid taint analysis framework for diagnosing attacks on binary programs." Journal of Computers, 2014. 9(3): p. 566-575.
14 M Ahmad, V Costamagna, B Crispo "TeICC: targeted execution of inter-component communications in Android." in Proceedings of the Symposium on Applied Computing. 2017. ACM.
15 M. Monga, R. Paleari, and E. Passerini. "A hybrid analysis framework for detecting web application vulnerabilities." in Proceedings of the 2009 ICSE Workshop on Software Engineering for Secure Systems. 2009. IEEE Computer Society.
16 A. Getman, V. Padaryan, and M. Solovyev. "Combined approach to solving problems in binary code analysis". in Proceedings of 9th International Conference on Computer Science and Information Technologies (CSIT'2013). 2013.
17 P. Dai, Z. Pan, and Y. Li. "A Review of Researching on Dynamic Taint Analysis Technique." in 2018 3rd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2018). 2018. Atlantis Press.
18 S Chen, J Xu, N Nakka, Z Kalbarczyk. "Defeating memory corruption attacks via pointer taintedness detection." in 2005 International Conference on Dependable Systems and Networks (DSN'05). 2005. IEEE.
19 GE Suh, JW Lee, D Zhang, S Devadas. "Secure program execution via dynamic information flow tracking." in ACM Sigplan Notices. 2004. ACM.
20 G Venkataramani, I Doudalis, Y Solihin. "Flexitaint: A programmable accelerator for dynamic taint propagation." in 2008 IEEE 14th International Symposium on High Performance Computer Architecture. 2008. IEEE.
21 J Shin, H Zhang, J Lee, I Heo, YY "Chen A hardware-based technique for efficient implicit information flow tracking." in 2016 IEEE/ACM International Conference on Computer-Aided Design (ICCAD). 2016. IEEE.
22 VP Kemerlis, G Portokalidis, K Jee, AD Keromytis. "libdft: Practical dynamic data flow tracking for commodity systems." in Acm Sigplan Notices. 2012. ACM.
23 W. Xu, S. Bhatkar, and R. Sekar. "Taint-Enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks." in USENIX Security Symposium. 2006.
24 V. Ganesh, T. Leek, and M. Rinard. "Taint-based directed whitebox fuzzing." in Proceedings of the 31st International Conference on Software Engineering. 2009. IEEE Computer Society.
25 TR Leek, GZ Baker, RE Brown, MA Zhivich, "Coverage maximization using dynamic taint tracing." 2007, MASSACHUSETTS INST OF TECH LEXINGTON LINCOLN LAB.
26 R Wang, G Xu, X Zeng, X Li, Z Feng TT-XSS: A novel taint tracking based dynamic detection framework for DOM Cross-Site Scripting. Journal of Parallel and Distributed Computing, 2018. 118: p. 100-106.
27 J. Clause, W. Li, and A. Orso. "Dytan: a generic dynamic taint analysis framework." in Proceedings of the 2007 international symposium on Software testing and analysis. 2007. ACM.
28 G. Portokalidis, A. Slowinska, and H. Bos."Argos: an emulator for fingerprinting zero-day attacks for advertised honeypots with automatic signature generation." in ACM SIGOPS Operating Systems Review. 2006. ACM.
29 D Song, D Brumley, H Yin, J Caballero, I Jager "BitBlaze: A new approach to computer security via binary analysis." in International Conference on Information Systems Security. 2008. Springer.
30 MG Kang, S McCamant, P Poosankam, D Song Dta++: dynamic taint analysis with targeted control-flow propagation. in NDSS. 2011.
31 L Li, TF Bissyande, M Papadakis, S Rasthofer. "Static analysis of android apps: A systematic literature review." Information and Software Technology, 2017. 88: p. 67-95.
32 X Wang, R Ma, B Dou, Z Jian, H Chen, "OFFDTAN: A New Approach of Offline Dynamic Taint Analysis for Binaries." Security and Communication Networks, 2018. 2018.
33 M Nunes, P Burnap, O Rana, P Reinecke, "Getting to the root of the problem: A detailed comparison of kernel and user level data for dynamic malware analysis" Journal of Information Security and Applications, 2019. 48: p. 102365.
34 M Vassena, A Russo, D Garg, V Rajani, "From fine-to coarse-grained dynamic information flow control and back." Proceedings of the ACM on Programming Languages, 2019. 3(POPL): p. 76.
35 H. Yin, and D. Song, "Whole-system Fine-grained Taint Analysis for Automatic Malware Detection and Analysis." Technical paper. College of William and Mary & Carnegie Mellon University, 2006.
36 M Polino, A Continella, S Mariani, S D'Alessio Measuring and defeating anti-instrumentation-equipped malware. in International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment. 2017. Springer.
37 D. Bruening, E. Duesterwald, and S. Amarasinghe. Design and implementation of a dynamic optimization framework for Windows. in 4th ACM Workshop on Feedback-Directed and Dynamic Optimization (FDDO-4). 2001.
38 CK Luk, R Cohn, R Muth, H Patil, A Klauser. "Pin: building customized program analysis tools with dynamic instrumentation." in Acm sigplan notices. 2005. ACM.
39 L.K. Yan, and H. Yin, "SoK: On the Soundness and Precision of Dynamic Taint Analysis."
40 D. Boxler, and K.R. Walcott. STA Tools to Detect Information Flows. in Proceedings of the International Conference on Software Engineering Research and Practice (SERP). 2018. The Steering Committee of The World Congress in Computer Science, Computer.
41 M. von Maltitz, C. Diekmann, and G. Carle. Privacy Assessment Using STA (Tool Paper). in International Conference on Formal Techniques for Distributed Objects, Components, and Systems. 2017. Springer.
42 X Lin, T Chen, T Zhu, K Yang, F Wei "Automated forensic analysis of mobile applications on Android devices." Digital Investigation, 2018. 26: p. S59-S66.
43 Z Xing, Z Bin, F Chao, Z Quan "Staticly Detect Stack Overflow Vulnerabilities with Taint Analysis." in ITM Web of Conferences. 2016. EDP Sciences.
44 C. Feng, and X. Zhang. A Static Taint Detection Method for Stack Overflow Vulnerabilities in Binaries. in 2017 4th International Conference on Information Science and Control Engineering (ICISCE). 2017. IEEE.
45 F. Pauck, and H. Wehrheim. Together strong: cooperative Android app analysis. in Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 2019. ACM.
46 S Arzt, S Rasthofer, C Fritz, E Bodden, A Bartel "Flowdroid: Precise context, flow, field, object-sensitive and lifecycle-aware taint analysis for android apps." in Acm Sigplan Notices. 2014. ACM.
47 ZB Celik, L Babun, AK Sikder, H Aksu, G Tan "Sensitive information tracking in commodity IoT." in 27th {USENIX} Security Symposium ({USENIX} Security 18). 2018.
48 N. Rosenblum, X. Zhu, and B.P. Miller. Who wrote this code? identifying the authors of program binaries. in European Symposium on Research in Computer Security. 2011. Springer.
49 O Tripp, M Pistoia, SJ Fink, M Sridharan, TAJ: effective taint analysis of web applications. ACM Sigplan Notices, 2009. 44(6): p. 87-97.
50 S Guarnieri, M Pistoia, O Tripp, J Dolby Saving the world wide web from vulnerable JavaScript. in Proceedings of the 2011 International Symposium on Software Testing and Analysis. 2011. ACM.
51 A Kurniawan, BS Abbas, A Trisetyarso STA Traversal with Object Oriented Component for Web File Injection Vulnerability Pattern Detection. Procedia Computer Science, 2018. 135: p. 596-605.
52 M.L. Minsky, Computation. 1967: Prentice-Hall Englewood Cliffs.
53 M Sridharan, S Artzi, M Pistoia, S Guarnieri F4F: taint analysis of framework-based web applications. in ACM SIGPLAN Notices. 2011. ACM.
54 O Tripp, M Pistoia, P Cousot, R Cousot Andromeda: Accurate and scalable security analysis of web applications. in International Conference on Fundamental Approaches to Software Engineering. 2013. Springer.
55 Y Zhu, J Jung, D Song, T Kohno, D Wetherall, Privacy scope: A precise information flow tracking system for finding application leaks. 2009, Citeseer.
56 A.R. Yumerefendi,, B. Mickle, and L.P. Cox. TightLip: Keeping Applications from Spilling the Beans. in NSDI. 2007.
57 J Jung, A Sheth, B Greenstein, D Wetherall "Privacy oracle: a system for finding application leaks with black box differential testing." in Proceedings of the 15th ACM conference on Computer and communications security. 2008. ACM.
58 DY Zhu, J Jung, D Song, T Kohno, TaintEraser: Protecting sensitive data leaks using application-level taint tracking. ACM SIGOPS Operating Systems Review, 2011. 45(1): p. 142-154.
59 W Enck, P Gilbert, S Han, V Tendulkar TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 2014. 32(2): p. 5.
60 M Costa, J Crowcroft, M Castro, A Rowstron Vigilante: End-to-end containment of internet worms. in ACM SIGOPS Operating Systems Review. 2005. ACM.
61 F Qin, C Wang, Z Li, H Kim, Y Zhou "Lift: A low-overhead practical information flow tracking system for detecting security attacks." in 2006 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO'06). 2006. IEEE.
62 J. Newsome, and D.X. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software. in NDSS. 2005. Citeseer.
63 X Wang, H Ma, K Yang, H Liang "An Uneven Distributed System for Dynamic Taint Analysis Framework." in 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing. 2015. IEEE.
64 X. Fu, and H. Cai." A dynamic taint analyzer for distributed systems." in Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 2019. ACM.
65 X. Fu, "On the scalable dynamic taint analysis for distributed systems." in Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 2019. ACM.
66 I. Papagiannis, and P. Pietzuch. "Cloudfilter: practical control of sensitive data propagation to the cloud." in Proceedings of the 2012 ACM Workshop on Cloud computing security workshop. 2012. ACM.
67 V Pappas, VP Kemerlis, A Zavou CloudFence: Data flow tracking as a cloud service. in International Workshop on Recent Advances in Intrusion Detection. 2013. Springer.
68 Y Ji, S Lee, E Downing, W Wang, M Fazzini "Rain: Refinable attack investigation with on-demand inter-process information flow tracking." in Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017. ACM.
69 G Xiao, J Wang, P Liu, J Ming, D Wu "Program-object level data flow analysis with applications to data leakage and contamination forensics." in Proceedings of the Sixth ACM Conference on Data and Application Security and Privacy. 2016. ACM.
70 N. Sapountzis, R. Sun, and D. Oliveira. "DDIFT: Decentralized Dynamic Information Flow Tracking for IoT Privacy and Security." in Workshop on Decentralized IoT Systems and Security (DISS). 2018.
71 H Yin, D Song, M Egele, C Kruegel "Panorama: capturing system-wide information flow for malware detection and analysis." in Proceedings of the 14th ACM conference on Computer and communications security. 2007. ACM.
72 A Dinaburg, P Royal, M Sharif, W Lee "Ether: malware analysis via hardware virtualization extensions." in Proceedings of the 15th ACM conference on Computer and communications security. 2008. ACM.
73 M Egele, C Kruegel, E Kirda, H Yin, D Song. "Dynamic spyware analysis." 2007.
74 J Yuan, W Qiang, H Jin, D Zou. "CloudTaint: an elastic taint tracking framework for malware detection in the cloud." The Journal of Supercomputing, 2014. 70(3): p. 1433-1450.
75 Funnywei, "Bufer Overfow Vulnerability Mining Model [Z/OL]," 2003, http://xcon.xfocus.net/XCon2003/archives/ Xcon2003 funnywei.pdf.
Mr. Abdullah Mujawib Alashjaee
Computer Science Department, University of Idaho, Moscow, ID, 83844, USA
Computer Science Department, Northern Borders University, Arar, 73222, Saudi Arabia - United States of America
alas0145@vandals.uidaho.edu
Mr. Salahaldeen Duraibi
Computer Science Department, University of Idaho, Moscow, ID, 83844, USA
Computer Science Department, Jazan University, Jazan, 45142, Saudi Arabia - United States of America
Dr. Jia Song
Computer Science Department, University of Idaho, Moscow, ID, 83844, USA - United States of America