Method and system for privacy disclosure detection

A technology of privacy leakage and detection method, applied in the field of mobile terminal security, can solve the problem of inability to effectively discover the privacy leakage behavior of application components, and achieve the effect of preventing privacy leakage

Active Publication Date: 2017-05-31
四川无声信息技术有限公司
View PDF10 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the purpose of the embodiments of the present invention is to provide a method and system that can effectively discover privacy leakage behaviors in program components, so as to change the defects in the prior art that cannot effectively discover privacy leakage behaviors in application program components

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for privacy disclosure detection
  • Method and system for privacy disclosure detection
  • Method and system for privacy disclosure detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0035] It should be noted that like numerals and let...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method and system for privacy disclosure detection. The method comprises the steps of searching a sensitive data source, a disclosure point and an application program interface of a callback function in an installation package according to a constructed sensitive data source, an application program interface table of disclosure points and an application program interface table of callback functions, and obtaining the sensitive data source, the disclosure point and the callback function in the installation package, and establishing an assembly life cycle model through the sensitive data source, the disclosure point and the callback function in the installation package; generating a virtual main function through the callback function in the installation package and the assembly life cycle model; causing the virtual main function to generate an inter-function control flow diagram through conversion, taking the sensitive data source in the installation package as an analysis starting point, analyzing the inter-function control flow diagram according to a data flow taint analysis algorithm, and obtaining a suspicious path of privacy disclosure; and outputting the suspicious path of privacy disclosure. Privacy disclosure behaviors in an application program assembly can be effectively found.

Description

technical field [0001] The present invention relates to the technical field of mobile terminal security, in particular, to a privacy leakage detection method and system. Background technique [0002] As the popularity of mobile devices becomes wider and wider, their functions become more and more powerful. In real life, the data stored in mobile devices is more complex and sensitive, including not only the users personal privacy data (address book, SMS, email, geographic location, photo album, browsing history, etc.), but also the data recorded by the mobile phone system. Logs, these valuable data are the targets of attackers. These valuable data may be leaked in the form of malicious software theft, or may be caused by the unreasonable setting of access rights to third-party application data, which will cause great trouble to users and losses. [0003] Detecting the privacy leakage behavior of applications has become one of the most popular security technologies. Curren...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F11/36
CPCG06F11/3612G06F21/55G06F2221/033
Inventor 黄勇周敏刘亮崔凯铜许春阳
Owner 四川无声信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products