Detection method of hidden dangers of information leakage in android application logs based on static analysis
A detection method, information leakage technology, applied in the direction of digital data protection, etc., can solve privacy leakage and other issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] The invention will be further described in detail below in conjunction with the embodiments and the accompanying drawings.
[0055] The overall schematic diagram of the detection method of the present invention is as figure 1 shown.
[0056] The present invention designs and implements the above-mentioned information leakage security detection technology based on traditional static information flow analysis. This section makes a detailed introduction to the specific implementation of the framework.
[0057] 1. Preprocessing stage
[0058] The present invention finally selects the DED tool to carry out the transformation work of decompiling DEX byte code transformation. DED is a set of conversion tools designed by Enck et al. to convert DEX bytecode into traditional Java bytecode. When DED converts DEX bytecodes into traditional Java bytecodes, there is a certain error rate. During the DEX conversion stage, correct Java bytecodes cannot be generated. However, all cu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 