LeakProber: A framework for profiling sensitive data leakage paths

Junfeng Yu, Shengzhi Zhang, Peng Liu, ZhiTang Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Abstract

In this paper, we present the design, implementation, and evaluation of LeakProber, a framework that leverages the whole system dynamic instrumentation and the inter-procedural analysis to enable data propagation path profiling in production system. We integrate both the static analysis and runtime tracking to establish a holistic and practical approach to generating the sensitive data propagation graph (sDPG) with minimum runtime overhead. We evaluate our system on several data stealing attacks scenario for generating sDPG. The sDPG generated by our system captures multiple aspects of data accessing patterns and provides clear insights into the data leakage path. We also measure the performance of our system and find that it degrades the production system about 6% in the trace-on mode. When our prototype works in the trace-off mode, the runtime overhead is even lower, on an average of 1.5% across each benchmark we run. We believe that it is feasible to directly apply our prototype into production system environment.

Original languageEnglish (US)
Title of host publicationCODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy
Pages75-84
Number of pages10
DOIs
StatePublished - 2011
Event1st ACM Conference on Data and Application Security and Privacy, CODASPY'11 - San Antonio, TX, United States
Duration: Feb 21 2011Feb 23 2011

Publication series

NameCODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy

Other

Other1st ACM Conference on Data and Application Security and Privacy, CODASPY'11
Country/TerritoryUnited States
CitySan Antonio, TX
Period2/21/112/23/11

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications

Fingerprint

Dive into the research topics of 'LeakProber: A framework for profiling sensitive data leakage paths'. Together they form a unique fingerprint.

Cite this