Information flow based defensive chain for data leakage detection and prevention: a survey

06/09/2021
by   Ning Xi, et al.
0

Mobile and IoT applications have greatly enriched our daily life by providing convenient and intelligent services. However, these smart applications have been a prime target of adversaries for stealing sensitive data. It poses a crucial threat to users' identity security, financial security, or even life security. Research communities and industries have proposed many Information Flow Control (IFC) techniques for data leakage detection and prevention, including secure modeling, type system, static analysis, dynamic analysis, etc. According to the application's development life cycle, although most attacks are conducted during the application's execution phase, data leakage vulnerabilities have been introduced since the design phase. With a focus on lifecycle protection, this survey reviews the recent representative works adopted in different phases. We propose an information flow based defensive chain, which provides a new framework to systematically understand various IFC techniques for data leakage detection and prevention in Mobile and IoT applications. In line with the phases of the application life cycle, each reviewed work is comprehensively studied in terms of technique, performance, and limitation. Research challenges and future directions are also pointed out by consideration of the integrity of the defensive chain.

READ FULL TEXT

page 1

page 3

page 4

page 13

page 16

page 17

page 24

page 25

research
05/17/2021

Microservices in IoT Security: Current Solutions, Research Challenges, and Future Directions

In recent years, the Internet of Things (IoT) technology has led to the ...
research
04/07/2020

Vulnerabilities Mapping based on OWASP-SANS: a Survey for Static Application Security Testing (SAST)

The delivery of a framework in place for secure application development ...
research
05/08/2020

On Designing Secure and Robust Scan Chain for Protecting Obfuscated Logic

In this paper, we assess the security and testability of the state-of-th...
research
08/12/2021

A Survey of Static Formal Methods for Building Dependable Industrial Automation Systems

Industrial automation systems (IAS) need to be highly dependable; they s...
research
08/09/2019

Cybersecurity in Brain-Computer Interfaces: State-of-the-art, opportunities, and future challenges

BCIs have significantly improved the patients' quality of life by restor...
research
07/16/2019

A Survey of Phase Classification Techniques for Characterizing Variable Application Behavior

Adaptable computing is an increasingly important paradigm that specializ...
research
04/17/2021

SoK: Design Tools for Side-Channel-Aware Implementions

Side-channel attacks that leak sensitive information through a computing...

Please sign up or login with your details

Forgot password? Click here to reset