We use cookies to improve your experience with our site.
Le-Jun Fan, Yuan-Zhuo Wang, Jing-Yuan Li, Xue-Qi Cheng, Chuang Lin. Privacy Petri Net and Privacy Leak Software[J]. Journal of Computer Science and Technology, 2015, 30(6): 1318-1343. DOI: 10.1007/s11390-015-1601-7
Citation: Le-Jun Fan, Yuan-Zhuo Wang, Jing-Yuan Li, Xue-Qi Cheng, Chuang Lin. Privacy Petri Net and Privacy Leak Software[J]. Journal of Computer Science and Technology, 2015, 30(6): 1318-1343. DOI: 10.1007/s11390-015-1601-7

Privacy Petri Net and Privacy Leak Software

  • Private information leak behavior has been widely discovered in malware and suspicious applications. We refer to such software as privacy leak software (PLS). Nowadays, PLS has become a serious and challenging problem to cyber security. Previous methodologies are of two categories: one focuses on the outbound network traffic of the applications; the other dives into the inside information flow of the applications. We present an abstract model called Privacy Petri Net (PPN) which is more applicable to various applications and more intuitive and vivid to users. We apply our approach to both malware and suspicious applications in real world. The experimental result shows that our approach can effectively find categories, content, procedure, destination and severity of the private information leaks for the target software.
  • loading

Catalog

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return