LeakProber

A framework for profiling sensitive data leakage paths

Junfeng Yu, Shengzhi Zhang, Peng Liu, ZhiTang Li

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

In this paper, we present the design, implementation, and evaluation of LeakProber, a framework that leverages the whole system dynamic instrumentation and the inter-procedural analysis to enable data propagation path profiling in production system. We integrate both the static analysis and runtime tracking to establish a holistic and practical approach to generating the sensitive data propagation graph (sDPG) with minimum runtime overhead. We evaluate our system on several data stealing attacks scenario for generating sDPG. The sDPG generated by our system captures multiple aspects of data accessing patterns and provides clear insights into the data leakage path. We also measure the performance of our system and find that it degrades the production system about 6% in the trace-on mode. When our prototype works in the trace-off mode, the runtime overhead is even lower, on an average of 1.5% across each benchmark we run. We believe that it is feasible to directly apply our prototype into production system environment.

Original languageEnglish (US)
Title of host publicationCODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy
Pages75-84
Number of pages10
DOIs
StatePublished - Mar 24 2011
Event1st ACM Conference on Data and Application Security and Privacy, CODASPY'11 - San Antonio, TX, United States
Duration: Feb 21 2011Feb 23 2011

Publication series

NameCODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy

Other

Other1st ACM Conference on Data and Application Security and Privacy, CODASPY'11
CountryUnited States
CitySan Antonio, TX
Period2/21/112/23/11

Fingerprint

Static analysis
Dynamical systems

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications

Cite this

Yu, J., Zhang, S., Liu, P., & Li, Z. (2011). LeakProber: A framework for profiling sensitive data leakage paths. In CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy (pp. 75-84). (CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy). https://doi.org/10.1145/1943513.1943525
Yu, Junfeng ; Zhang, Shengzhi ; Liu, Peng ; Li, ZhiTang. / LeakProber : A framework for profiling sensitive data leakage paths. CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy. 2011. pp. 75-84 (CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy).
@inproceedings{7d1f26103fa34b73a4fe0ffffc3f3a81,
title = "LeakProber: A framework for profiling sensitive data leakage paths",
abstract = "In this paper, we present the design, implementation, and evaluation of LeakProber, a framework that leverages the whole system dynamic instrumentation and the inter-procedural analysis to enable data propagation path profiling in production system. We integrate both the static analysis and runtime tracking to establish a holistic and practical approach to generating the sensitive data propagation graph (sDPG) with minimum runtime overhead. We evaluate our system on several data stealing attacks scenario for generating sDPG. The sDPG generated by our system captures multiple aspects of data accessing patterns and provides clear insights into the data leakage path. We also measure the performance of our system and find that it degrades the production system about 6{\%} in the trace-on mode. When our prototype works in the trace-off mode, the runtime overhead is even lower, on an average of 1.5{\%} across each benchmark we run. We believe that it is feasible to directly apply our prototype into production system environment.",
author = "Junfeng Yu and Shengzhi Zhang and Peng Liu and ZhiTang Li",
year = "2011",
month = "3",
day = "24",
doi = "10.1145/1943513.1943525",
language = "English (US)",
isbn = "9781450304665",
series = "CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy",
pages = "75--84",
booktitle = "CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy",

}

Yu, J, Zhang, S, Liu, P & Li, Z 2011, LeakProber: A framework for profiling sensitive data leakage paths. in CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy. CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy, pp. 75-84, 1st ACM Conference on Data and Application Security and Privacy, CODASPY'11, San Antonio, TX, United States, 2/21/11. https://doi.org/10.1145/1943513.1943525

LeakProber : A framework for profiling sensitive data leakage paths. / Yu, Junfeng; Zhang, Shengzhi; Liu, Peng; Li, ZhiTang.

CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy. 2011. p. 75-84 (CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - LeakProber

T2 - A framework for profiling sensitive data leakage paths

AU - Yu, Junfeng

AU - Zhang, Shengzhi

AU - Liu, Peng

AU - Li, ZhiTang

PY - 2011/3/24

Y1 - 2011/3/24

N2 - In this paper, we present the design, implementation, and evaluation of LeakProber, a framework that leverages the whole system dynamic instrumentation and the inter-procedural analysis to enable data propagation path profiling in production system. We integrate both the static analysis and runtime tracking to establish a holistic and practical approach to generating the sensitive data propagation graph (sDPG) with minimum runtime overhead. We evaluate our system on several data stealing attacks scenario for generating sDPG. The sDPG generated by our system captures multiple aspects of data accessing patterns and provides clear insights into the data leakage path. We also measure the performance of our system and find that it degrades the production system about 6% in the trace-on mode. When our prototype works in the trace-off mode, the runtime overhead is even lower, on an average of 1.5% across each benchmark we run. We believe that it is feasible to directly apply our prototype into production system environment.

AB - In this paper, we present the design, implementation, and evaluation of LeakProber, a framework that leverages the whole system dynamic instrumentation and the inter-procedural analysis to enable data propagation path profiling in production system. We integrate both the static analysis and runtime tracking to establish a holistic and practical approach to generating the sensitive data propagation graph (sDPG) with minimum runtime overhead. We evaluate our system on several data stealing attacks scenario for generating sDPG. The sDPG generated by our system captures multiple aspects of data accessing patterns and provides clear insights into the data leakage path. We also measure the performance of our system and find that it degrades the production system about 6% in the trace-on mode. When our prototype works in the trace-off mode, the runtime overhead is even lower, on an average of 1.5% across each benchmark we run. We believe that it is feasible to directly apply our prototype into production system environment.

UR - http://www.scopus.com/inward/record.url?scp=79952781843&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=79952781843&partnerID=8YFLogxK

U2 - 10.1145/1943513.1943525

DO - 10.1145/1943513.1943525

M3 - Conference contribution

SN - 9781450304665

T3 - CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy

SP - 75

EP - 84

BT - CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy

ER -

Yu J, Zhang S, Liu P, Li Z. LeakProber: A framework for profiling sensitive data leakage paths. In CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy. 2011. p. 75-84. (CODASPY'11 - Proceedings of the 1st ACM Conference on Data and Application Security and Privacy). https://doi.org/10.1145/1943513.1943525