Title
Using Taint Analysis for Threat Risk of Cloud Applications
Abstract
Most existing approaches to developing cloud applications using threat analysis involve program vulnerability analyses for identifying the security holes associated with malware attacks. New malware attacks can bypass firewall-based detection by bypassing stack protection and by using Hypertext Transfer Protocol logging, kernel hacks, and library hack techniques, and to the cloud applications. In performing threat analysis for unspecified malware attacks, software engineers can use a taint analysis technique for tracking information flows between attack sources (malware) and detect vulnerabilities of targeted network applications. This paper proposes a threat risk analysis model incorporating an improved attack tree analysis scheme for solving the mobile security problem, in the model, Android programs perform taint checking to analyse the risks posed by suspicious applications. In probabilistic risk analysis, defence evaluation metrics are used for each attack path for assisting a defender simulate the attack results against malware attacks and estimate the impact losses. Finally, a case of threat analysis of a typical cyber security attack is presented to demonstrate the proposed approach.
Year
DOI
Venue
2014
10.1109/ICEBE.2014.40
ICEBE
Keywords
DocType
Citations 
firewalls,attack defence tree,improved attack tree analysis scheme,invasive software,mobile security problem,cyber attacks, threat, analysis, taint checking, attack defence tree,hypertext transfer protocol logging,defence evaluation metrics,trees (mathematics),threat risk analysis model,cloud applications,cyber security attack,kernel hacks,library hack techniques,attack sources,probabilistic risk analysis,security holes,risk analysis,analysis,program vulnerability analysis,malware attacks,program diagnostics,android programs,taint checking,threat,information flow tracking,software engineers,stack protection,taint analysis technique,mobile computing,hypermedia,cyber attacks,android (operating system),firewall-based detection,threat analysis
Conference
0
PageRank 
References 
Authors
0.34
0
4
Name
Order
Citations
PageRank
Ping Wang123515.84
Wun Jie Chao211.02
Kuo-Ming Chao31123130.82
Chi-Chun Lo459354.99