Static detection method for privacy information disclosure in mobile applications

A privacy information and static detection technology, applied in the field of software testing technology and application security detection, can solve problems such as property loss, personal safety threat, and privacy leakage of intelligent mobile terminal users, and improve detection efficiency and detection accuracy. Effect

Active Publication Date: 2014-02-12
BEIJING UNIV OF POSTS & TELECOMM
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] At present, the privacy and security issues of the mobile Internet are serious. Once the privacy information is leaked, it will cause property losses to the smart mobile terminal users, and the reputation, personality, and even personal safety will be threatened. The consequences for development will be severe
However, the existing commonly used mobile phone security software to detect and kill privacy leaks is difficult to prevent the leakage of mobile phone privacy information from the source due to various reasons such as various operating platforms and regular updates or upgrades.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Static detection method for privacy information disclosure in mobile applications
  • Static detection method for privacy information disclosure in mobile applications
  • Static detection method for privacy information disclosure in mobile applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0059] The static detection method for privacy information leakage in mobile applications of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments of the present invention, taking detection under the Android platform as an example (other mobile terminal operating systems are similar to it).

[0060] figure 1 It is a schematic flowchart of a static detection method for privacy information leakage in mobile applications of the present invention. Such as figure 1 shown, including the following steps:

[0061] Step A, obtain the input of the source code, and check the completeness of the source code according to the operating system, such as the application characteristics of the Android platform.

[0062] Here, the directory where the source code project is located is obtained through the program entry parameter, and the source code is detected. Among them, Android applications are slightly different from ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a static detection method for privacy information disclosure in mobile applications. The method comprises the steps as follows: firstly, the completeness of codes is checked, if the codes are incomplete, preparatory work is performed on source codes, state machine description files corresponding to the privacy disclosure are loaded, related state machine information is obtained, the source codes are compiled to obtain detailed information of classes, functions and the like, pre-analysis is performed on the source codes, basic data structures such as abstract syntax trees and the like are generated, and call relations among the functions are obtained; and then detection and analysis is performed in units of the functions, state machine instances are created for all state machines with associated methods in the state machines, state machine instance iteration is performed on control flow diagrams corresponding to the functions, when the state machine instances are in error states, errors are reported, after detection is finished, the detected errors are checked manually, and detection results are confirmed. With the adoption of the method, the privacy disclosure codes existing in application programs of different operating system platforms can be effectively detected, so that the privacy information disclosure of users can be effectively prevented.

Description

technical field [0001] The invention relates to software testing technology and application program safety detection technology, in particular to a static detection method for privacy information leakage in mobile applications. Background technique [0002] Mobile device application privacy leakage has attracted the attention of many research institutions and scholars, and many institutions at home and abroad have carried out related research. According to whether the detected application is running, detection technologies can be divided into two types: dynamic detection and static detection. [0003] The dynamic detection technology is to check whether the application has leaked privacy during the process of running the application. Since the detection is performed during the running of the application, dynamic detection has relatively high requirements for real-time performance, because threats must be detected before the malicious application leaks the user's privacy. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
Inventor 王雅文宫云战黄俊飞于鹏洋金大海
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products