Detection method for information leakage hidden trouble in Android application log based on static state analysis

A detection method and technology for information leakage, which can be applied in the fields of instruments, electrical digital data processing, computer security devices, etc., and can solve problems such as privacy leakage

Active Publication Date: 2012-10-17
FUDAN UNIV
View PDF4 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For security reasons, the Android operating system grants certain usage rights to the existing log system to protect it, but the research found that the user's private information can be written ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method for information leakage hidden trouble in Android application log based on static state analysis
  • Detection method for information leakage hidden trouble in Android application log based on static state analysis
  • Detection method for information leakage hidden trouble in Android application log based on static state analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The invention will be further described in detail below in conjunction with the embodiments and the accompanying drawings.

[0055] The overall schematic diagram of the detection method of the present invention is as figure 1 shown.

[0056] The present invention designs and implements the above-mentioned information leakage security detection technology based on traditional static information flow analysis. This section makes a detailed introduction to the specific implementation of the framework.

[0057] 1. Preprocessing stage

[0058] The present invention finally selects the DED tool to carry out the transformation work of decompiling DEX byte code transformation. DED is a set of conversion tools designed by Enck et al. to convert DEX bytecode into traditional Java bytecode. When DED converts DEX bytecodes into traditional Java bytecodes, there is a certain error rate. During the DEX conversion stage, correct Java bytecodes cannot be generated. However, all cu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to a technical field of program information safety detection, and more specifically relates to a detection method for information leakage hidden trouble in an Android application log based on static state analysis. The method comprises a pretreatment phase, a private information identification phase, an information flow propagation phase, and log recording spot detection phase. According to the invention, a safety detection strategy combing a traditional static state information flow analysis technology and a newly developing mobile platform operating system programming model is designed. The strategy mainly points at the present mobile application shop, and the strategy is used to off-line detect information safety hidden trouble in mobile application. With the strategy, security risk in the program is prevented, thereby application quality in the shop is guaranteed.

Description

technical field [0001] The invention belongs to the technical field of program information security detection, and in particular relates to a method for detecting hidden dangers of log records in Android application programs by using static information flow analysis technology. Background technique [0002] Information leakage, also known as privacy leakage, refers to an act of illegally disclosing the private information of a party without the authorization of the party. With the increasingly rapid development of Internet technology and the gradual enhancement of the computing power of mobile devices, the next-generation computing platform has gradually shifted from the traditional desktop platform to the mobile platform. Mobile platforms such as mobile phones often contain a large amount of important information related to user privacy. Therefore, when users use third-party applications, there is a risk of private information being stolen by the application, resulting in p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/00
Inventor 杨珉张源彭智俊
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products