COMP 3000 Essay 2 2010 Question 8: Difference between revisions

From Soma-notes
Gbint (talk | contribs)
added title, author info
Gautam (talk | contribs)
Line 25: Line 25:
Explain briefly the background concepts and ideas that your fellow classmates will need to know first in order to understand your assigned paper.
Explain briefly the background concepts and ideas that your fellow classmates will need to know first in order to understand your assigned paper.


* Background on Information Flow Theory. Explicit and Implicit Flow.
* Background on the taint data tracking method, how it has been used in other systems (i.e. not phones)
* Background on the taint data tracking method, how it has been used in other systems (i.e. not phones)
* A reader's digest version of any new articles about this kind of security vulnerability on phones, on apps that collect more personal data than users would expect.
* A reader's digest version of any new articles about this kind of security vulnerability on phones, on apps that collect more personal data than users would expect.


=Research problem=
=Research problem=

Revision as of 13:32, 20 November 2010

Paper

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

Authors:

  • William Enck, The Pennsylvania State University
  • Peter Gilbert, Duke University
  • Byung-Gon Chun, Intel Labs
  • Landon P. Cox, Duke University
  • Jaeyeon Jung, Intel Labs
  • Patrick McDaniel, The Pennsylvania State University
  • Anmol N. Sheth, Intel Labs


Official Website: http://www.appanalysis.org/

Direct Link to Paper: http://appanalysis.org/tdroid10.pdf

Video demonstration of TaintDroid in action: http://www.youtube.com/watch?v=qnLujX1Dw4Y


Background Concepts

Explain briefly the background concepts and ideas that your fellow classmates will need to know first in order to understand your assigned paper.

  • Background on Information Flow Theory. Explicit and Implicit Flow.
  • Background on the taint data tracking method, how it has been used in other systems (i.e. not phones)
  • A reader's digest version of any new articles about this kind of security vulnerability on phones, on apps that collect more personal data than users would expect.

Research problem

What is the research problem being addressed by the paper? How does this problem relate to past related work?

Contribution

What are the research contribution(s) of this work? Specifically, what are the key research results, and what do they mean? (What was implemented? Why is it any better than what came before?)

Critique

What is good and not-so-good about this paper? You may discuss both the style and content; be sure to ground your discussion with specific references. Simple assertions that something is good or bad is not enough - you must explain why.

References

You will almost certainly have to refer to other resources; please cite these resources in the style of citation of the papers assigned (inlined numbered references). Place your bibliographic entries in this section.