Method for identifying permission-irrelevant private data in Android application program

An Android application, privacy data technology, applied in the fields of digital data protection, electronic digital data processing, semi-structured data retrieval, etc., can solve problems such as inability to detect and analyze, and achieve the effect of low resource consumption and fast speed

Active Publication Date: 2015-10-07
FUDAN UNIV
View PDF4 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, from the perspective of program analysis, it cannot be effectively detected and analyzed through information flow analysis, taint tracking technology, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for identifying permission-irrelevant private data in Android application program
  • Method for identifying permission-irrelevant private data in Android application program
  • Method for identifying permission-irrelevant private data in Android application program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The present invention designs and implements the above-mentioned non-privacy detection system based on machine learning technology and static information flow analysis technology. This section makes a detailed introduction to the specific implementation of the framework.

[0062] (1) Data preprocessing

[0063] The present invention adopts Apktool to carry out reverse engineering to the Android application program, and Apktool is the Android application program compiling software provided by Google, which can decompile the application program, and can obtain various resource files inside the application program during decompilation. The integrity of the file is guaranteed. Therefore, the present invention selects it to realize the resource file extraction module.

[0064] For the resource file after extraction, the present invention uses the NLTK toolkit of Python to carry out text preprocessing to it. The NLTK toolkit is one of the most commonly used toolkits in na...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of program information security detection and particularly relates to a method for identifying permission-irrelevant private data in an Android application program. The method comprises four stages of data preprocessing, privacy related text analysis, non-permission privacy related interface element identification and static code information stream analysis based filtration; and mainly aiming at the permission-irrelevant private data in the Android application program outside the protection range of a permission model of an Android system, a machine learning technology and a conventional static information stream analysis technology are combined for identification. The private data can be marked as a sensitive data source by identifying the private data, and a basis is provided for monitoring and protection of the private data by further combination of a conventional static information stream analysis and detection technology or a dynamic stain information tracking and detection technology, so that the leakage risk of the private data of a user is lowered.

Description

technical field [0001] The invention belongs to the technical field of program information security detection, and specifically relates to a method for identifying non-permission-related private data in an Android application program by using natural language processing, machine learning technology and static information flow analysis technology. Background technique [0002] When it comes to user privacy information in the Android system, it can be roughly divided into two categories. The first category is user privacy related to permissions, and the second category is user privacy not related to permissions. Among them, permission-related user privacy refers to user privacy information that can be obtained by calling the function interface provided by the Android system permission model, such as calling the getIMEI() function to obtain the mobile phone serial number, and calling the getLocation() function to obtain user geographic location information wait. Since Android ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62G06F17/30G06F17/27
CPCG06F16/16G06F16/80G06F21/6254G06F40/205G06F40/258
Inventor 杨珉杨哲慜南雨宏周顺帆张源
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products