Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Application privacy leakage detection method and system, terminal and medium

A privacy disclosure and application technology, applied in the field of privacy protection, can solve problems such as false negatives, inability to achieve large-scale detection, and no explanation or report found

Active Publication Date: 2021-07-23
SHANGHAI JIAO TONG UNIV
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In traffic analysis, since there is no way to detect some leaks whose names are intentionally changed but hidden in plaintext traffic, it will also cause static analysis to conduct indiscriminate branch search, thereby greatly increasing the number of static search branches, resulting in search Time increases; at the same time, due to the need for individual customization and root operating system for a single or a class of application package files in traditional dynamic detection, large-scale detection cannot be achieved; dynamic taint tracking needs to be performed according to preset functions Marking of taints, so that privacy leaks caused by calling third-party APIs cannot be detected, resulting in false negatives, and the spread of taints in the process of taint tracking will cause false positives
[0010] At present, there is no description or report of the similar technology of the present invention, and no similar data at home and abroad have been collected yet.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application privacy leakage detection method and system, terminal and medium
  • Application privacy leakage detection method and system, terminal and medium
  • Application privacy leakage detection method and system, terminal and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The following is a detailed description of the embodiments of the present invention: this embodiment is implemented on the premise of the technical solution of the present invention, and provides detailed implementation methods and specific operation processes. It should be noted that those skilled in the art can make several modifications and improvements without departing from the concept of the present invention, and these all belong to the protection scope of the present invention.

[0055] figure 1 It is a flowchart of an application program (APP) privacy leakage detection method provided by an embodiment of the present invention.

[0056] Such as figure 1 As shown, the application privacy leakage detection method provided in this embodiment may include the following steps for GDPR:

[0057] S100, obtaining the application package file (APK) to be detected;

[0058] S200, automatically installing and running the APK required for detection, and collecting data in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an application privacy leakage detection method and system. The method comprises the following steps: acquiring a to-be-detected APK for a GDPR; establishing a dynamic detection system, automatically installing and operating the APK, and collecting data information required by dynamic detection; during the automatic installation and operation period of the APK, establishing static detection channels in parallel, and collecting data information needed by static detection and matched with the data information needed by dynamic detection; and through combination of the data information required by dynamic detection and static detection and by means of association analysis and data flow information matching, screening out required information and privacy so as to complete detection of privacy disclosure of the application program. Meanwhile, the invention provides a corresponding terminal and a medium. According to the invention, the problem of privacy leakage in application programs can be automatically, efficiently and accurately detected in a short time without manually setting rules; and the privacy leakage of the application programs can be quickly, simply, conveniently and flexibly detected, and the requirements of the industry are met.

Description

technical field [0001] The present invention relates to the technical field of privacy protection, and specifically relates to a method, system, terminal and medium for detecting privacy leakage of applications for GDPR (General Data Protection Regulation) using a combination of dynamic detection and static detection. Background technique [0002] With the popularization and generalization of network and mobile phone technology, the protection of privacy has attracted the attention of various countries. my country has fully implemented the "Network Security Law of the People's Republic of China" since June 1, 2017, which clearly strengthens the protection of personal privacy, and requires network products and services to have the function of collecting user information, and its provider shall clearly indicate to the user and Obtain consent; network operators must not disclose, tamper with, or damage the personal information they collect; any individual or organization must no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62G06F21/56G06F21/57
CPCG06F21/6245G06F21/562G06F21/566G06F21/572
Inventor 朱浩瑾杨若虚周路
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products