An Android privacy disclosure behavior detection method and technology based on information flow
A detection technology and privacy leakage technology, applied in the field of mobile security privacy leakage behavior detection technology and system, can solve the problems of dynamic analysis limitation, program interruption, etc., and achieve the effects of expanding the scope, improving the detection rate, and high code coverage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0026] The present invention will be further explained below with reference to the drawings and examples.
[0027] Such as figure 1 As shown, an Android privacy information leakage behavior identification method based on information flow analysis has the following steps.
[0028] The control flow graph building module is based on source code analysis and Jimple intermediate representation. The source code contains method call parameters for component communication, corresponding permissions and intent attributes, and intent information is used to match the called component and the spread of privacy information, in order to match the calling component and the called component. The calling component uses the intent information to match the filtering rules of the component. The calling component needs the corresponding permission to access the called component. In order to detect whether there is privacy information leakage behavior in the component communication, the present invention...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap