A third-party library information leakage detection method and device

A leakage detection and information leakage technology, applied in the field of information security, can solve problems such as illegal acquisition of important data, leakage of key information, etc., and achieve the effect of security detection

Active Publication Date: 2021-09-28
BEIJING UNIV OF POSTS & TELECOMM +2
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there may be malicious code implanted in the third-party library, and important data can be obtained illegally when the third-party library is called, resulting in the leakage of key information. Therefore, the detection of the third-party library is a key technology to ensure information security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A third-party library information leakage detection method and device
  • A third-party library information leakage detection method and device
  • A third-party library information leakage detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the present disclosure will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0044] It should be noted that, unless otherwise defined, the technical terms or scientific terms used in one or more embodiments of the present specification shall have ordinary meanings understood by those skilled in the art to which the present disclosure belongs. "First", "second" and similar words used in one or more embodiments of the present specification do not indicate any order, quantity or importance, but are only used to distinguish different components. "Comprising" or "comprising" and similar words mean that the elements or items appearing before the word include the elements or items listed after the word and their equivalents, without excluding other elements or items. Words such as "connected" or "con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

One or more embodiments of this specification provide a method and apparatus for detecting information leakage of a third-party library, including identifying a source point for acquiring information about an application in a third-party library called by an application; starting from the source point, tracking the processing of information Path, determine the sink point of the information; if the sink point is located in a non-application, determine that the information is leaked through a third-party library; output information leakage prompt information. According to the method in this specification, it is possible to detect whether there is information leakage in the third-party library, and realize the security detection of the third-party library.

Description

technical field [0001] One or more embodiments of this specification relate to the field of information security technologies, and in particular to a method and device for detecting third-party database information leakage. Background technique [0002] With the popularization of smart terminals, the number of applications that can be installed on smart terminals has not only increased dramatically, but also has rich and varied functions, which has greatly improved user experience. The function implementation of some applications depends on third-party libraries, and the application functions are enhanced by calling various tool libraries. However, there may be malicious code implanted in the third-party library, and important data can be obtained illegally when the third-party library is called, resulting in the leakage of key information. Therefore, the detection of the third-party library is a key technology to ensure information security. Contents of the invention [...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06F21/62
CPCG06F21/563G06F21/6218
Inventor 徐国爱张淼魏然宁华刘海峰徐国胜张钦尧
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products