Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Recognition method of privacy leakage behavior between Android components based on context information

A privacy leakage and context technology, applied in the field of privacy leakage behavior identification, can solve the problems of not distinguishing privacy transmission behavior privacy leakage behavior, privacy leakage between components, no data flow analysis, and incomplete consideration of components.

Inactive Publication Date: 2017-08-29
INST OF INFORMATION ENG CAS
View PDF3 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this inter-component communication (ICC) mechanism can also be exploited by malicious applications, resulting in privacy leaks between components.
In order to slow down the privacy leakage behavior caused by communication between components, some researchers have performed ICC analysis on Android applications, but there are still deficiencies. For example, some existing studies have not linked source components and destination components to perform data flow analysis, Consider components not comprehensive, etc.
In addition, the data flow of sensitive information may be legitimate or malicious, and these proposed methods do not distinguish between legitimate privacy transmission behaviors and malicious privacy disclosure behaviors.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Recognition method of privacy leakage behavior between Android components based on context information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below through specific examples and accompanying drawings.

[0029] Such as figure 1 As shown, a method for identifying privacy leakage behavior between Android components based on context information, the steps include:

[0030] 1. Application decompilation module

[0031] The invention is based on the jimple file, performs static analysis, and obtains parameter information related to communication between Android application program components. Specifically, in this embodiment, the soot tool is used to decompile the Android application program.

[0032] 2. Component call chain construction module

[0033] An inter-component communication link is a connection between a source component and a destination component. The source component code contains the ICC function and sends an Intent message to the destination component. The Intent message describes various information of the target component. In order to match the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a recognition method of a privacy leakage behavior between Android components based on the context information. The method comprises the steps that firstly, communication parameter information between the components in an Android application program is extracted; secondly, according to the extracted communication parameter information between the components, two mutually communicated components in the Android application program are matched, and a component call chain is formed; thirdly, according to the component call chain information, static instrumentation is conducted on the Android application program, the two mutually communicated components are connected; fourthly, the application program codes obtained after instrumentation are subjected to static taint analysis, the behavior path associated with the privacy information transmission between the components is obtained, and the context information of the behavior path is extracted; fifthly, according to the obtained context information of the behavior path, whether the privacy information transmission behavior between the components is the privacy leakage behavior or not is judged. By means of the method and system, the accuracy of the communication analysis between the components is greatly improved.

Description

technical field [0001] The invention belongs to the technical field of mobile platform privacy leakage detection, and in particular relates to a method and system for identifying privacy leakage behaviors caused by communication between Android application program components. Background technique [0002] With the development of mobile terminal equipment, smart phones have become an indispensable part of people's daily life. Among the currently popular smart terminal operating systems, the Android system has the highest market share. Due to the low threshold of Android application development and the insufficient review of the application market, there are a large number of vulnerable applications and malicious applications in the third-party application market. A large amount of user privacy data is stored on mobile devices. Due to the existence of loopholes and malicious applications, user privacy data is leaked intentionally or unintentionally, which seriously threatens ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/56G06F21/62
CPCG06F21/562G06F21/6245
Inventor 王蕊张道娟郭电杰操晓春
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products