Data exporting tool security analysis method and system and data exporting method
A technology of data export and analysis method, applied in the field of data processing, can solve the problem of lack of inspection and verification of export tools, and achieve the effect of strengthening safety detection and monitoring, low cost, and wide application and promotion value
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0050] Please refer tofigure 1 , figure 1 It is a schematic flowchart of a security analysis method for a data export tool. Embodiment 1 of the present invention provides a security analysis method for a data export tool. The method includes:
[0051] Obtain the source code or object code of the data export tool;
[0052] Analyze the source code or object code of the data export tool to obtain the analysis results of the data export tool. The analysis results of the data export tool include: whether the grammatical structure of the data export tool is correct, whether there is an unexpected structure in the data export tool, whether the functional modules in the data export tool Whether there are isolated functional modules in the directed control flow graph between and data export tools;
[0053] Based on the requirements of this data export task and the analysis results of the data export tool, judge whether it is safe for the data export tool to perform this data export ta...
Embodiment approach
[0054] The method is described in detail below in conjunction with specific examples, but the method is not limited to the following implementation modes, and the method includes:
[0055] 1. For the export tool without source code, decompile it to obtain the target code;
[0056] 2. Perform static syntax analysis on the source code or object code of the export tool:
[0057] 2.1 Lexical analysis: use the grammatical analysis tool lex, according to the type of programming language used, such as Java, C / C++, C#, GO, Python, etc., based on the grammatical rules of each language, use regular expressions to convert all key grammars, the focus is Expressions related to input and output generate a symbol list; wherein, other grammatical analysis tools can also be used in this embodiment, and the present invention does not limit the type of grammatical analysis tools;
[0058] 2.2 Grammatical analysis: use the grammatical analysis tool yacc to further generate a syntax tree from the...
Embodiment 2
[0069] Embodiment 2 of the present invention provides a data export method, and the method includes:
[0070] Analyzing the security of the data export tool using the described data export tool security analysis method;
[0071] Use the security-analyzed data export tool to export data from the data source.
[0072] Wherein, the data exporting method in the present invention overcomes the defect that the traditional method does not consider the security of the data exporting tool itself by judging the security of the data exporting tool.
[0073] Wherein, in Embodiment 2 of the present invention, the method further includes:
[0074] Analyze the data source and obtain the data type of the data source, including: public data, proprietary data and private data;
[0075] For public data, suspicious or high-risk behavior of data export tools is allowed;
[0076] For proprietary data, if the data export tool has suspicious or high-risk behavior, it will be transferred to manual ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

