Unlock instant, AI-driven research and patent intelligence for your innovation.

A system call-level monitoring method for Android user privacy data access

A technology for user privacy and data access, applied in the fields of electronic digital data processing, computer security devices, instruments, etc., can solve the problems of coarse granularity, low precision, reduced application execution efficiency and system stability, etc.

Active Publication Date: 2018-08-03
XIDIAN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Compared with the above two types of monitoring mechanisms, the analysis time of the static mechanism is long and the accuracy is not high, but the operation is simple
The dynamic mechanism implements fine-grained access control for applications, but the implementation is relatively complicated, and it will reduce the execution efficiency of the application and the stability of the system. Risks such as proxy attacks
One of the main reasons for these problems is that when security software performs dynamic access management, it analyzes the control at the API interface level of the Android framework layer. The granularity is not fine enough, the depth of the system is not deep enough, and it cannot prevent service programs from being hijacked. Security attacks, the granularity is relatively coarse for post-event audit and analysis

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A system call-level monitoring method for Android user privacy data access
  • A system call-level monitoring method for Android user privacy data access
  • A system call-level monitoring method for Android user privacy data access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0086] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0087] see figure 1 , the present invention is based on the binder driver to realize two parts: identification of private data access, monitoring task initiation and system call monitoring. In the execution process of the present invention, it is necessary to carry out privacy-related marks on the registered system services. The identification part of the privacy data mainly includes judging whether the access request involves a privacy service in the access thread, and initiating a monitoring transaction in the execution thread. For the identification part and The monitoring part also needs to be synchronized, so that the monitoring thread performs privacy access operation before the monitored thread and stops the execution of the monitoring thread after the execution thread completes the service.

[0088] The operating system provides system services of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system call level monitoring method for accessing to private data of an Android user. The system call level monitoring method comprises the following steps: 1, marking a private system service; 2, processing a private service accessing request; 3, processing a monitoring affair; 4, processing private accessing, and returning a result. According to the system call level monitoring method, by identification of private data accessing and starting of monitoring, a third-party thread carries out system call level monitoring on a thread providing a service; a third-party service acquires system call information of the monitored thread by expanding a ServiceManager service of an original system and applying ptrace () system call; meanwhile, in the overall monitoring process, an attribute system in the original system fulfills the aims that the monitored thread cyclically waits for the starting of the monitoring thread and the serving thread achieves the purpose of enabling the monitoring thread to stop monitoring . The system call level monitoring method realizes monitoring of the accessing to the private data at the system call level, so that accessing auditing and protection strategies can be performed on the private data in a finer-grained manner at a deeper level.

Description

technical field [0001] The invention relates to the field of protection of privacy data of smart mobile terminal users, in particular to a system call-level monitoring method based on binder-driven Android user privacy data access. Background technique [0002] As the most popular open source mobile device operating platform, the number and importance of user privacy data stored in the Android system are increasing. With the prevalence of applications based on the Android platform, the behavior of accessing system services by third-party mobile applications has gradually become normalized, but the behavior of obtaining other privacy permissions when their own functions are not required can easily lead to the leakage of user privacy data, and further harm users. Unnecessary loss of life and even property. [0003] When a third-party application accesses private data, Android uses the binder inter-process communication mechanism to remotely call system services to achieve acc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/52
CPCG06F21/52G06F21/554
Inventor 李金库孙康孙聪卢笛姚青松马建峰
Owner XIDIAN UNIV