We use cookies to improve your experience with our site.
范乐君, 王元卓, 李静远, 程学旗, 林闯. 隐私佩特里网与隐私泄露软件[J]. 计算机科学技术学报, 2015, 30(6): 1318-1343. DOI: 10.1007/s11390-015-1601-7
引用本文: 范乐君, 王元卓, 李静远, 程学旗, 林闯. 隐私佩特里网与隐私泄露软件[J]. 计算机科学技术学报, 2015, 30(6): 1318-1343. DOI: 10.1007/s11390-015-1601-7
Le-Jun Fan, Yuan-Zhuo Wang, Jing-Yuan Li, Xue-Qi Cheng, Chuang Lin. Privacy Petri Net and Privacy Leak Software[J]. Journal of Computer Science and Technology, 2015, 30(6): 1318-1343. DOI: 10.1007/s11390-015-1601-7
Citation: Le-Jun Fan, Yuan-Zhuo Wang, Jing-Yuan Li, Xue-Qi Cheng, Chuang Lin. Privacy Petri Net and Privacy Leak Software[J]. Journal of Computer Science and Technology, 2015, 30(6): 1318-1343. DOI: 10.1007/s11390-015-1601-7

隐私佩特里网与隐私泄露软件

Privacy Petri Net and Privacy Leak Software

  • 摘要: 隐私信息泄露行为已经在越来越多的恶意软件和可疑应用程序中被发现, 因此我们将具有此类行为的软件成为隐私泄露软件。隐私泄露软件已成为严重的网络安全问题。现有的相关研究工作可以分为两种思路: 一种关注软件向外的网络流量, 另一种则深入发掘软件内部的信息流。我们提出了一种称为隐私佩特里网的抽象模型, 该模型能够对于各类应用程序都能给出更加直观和清晰的分析结果。我们应用该模型对于实际的恶意软件和可疑应用程序构成的隐私泄露软件集合进行了测试, 结果表明我们的方法能够有效的分析出暗藏的隐私泄露行为的泄露类型、内容、去向和严重性等多方面的细节。

     

    Abstract: Private information leak behavior has been widely discovered in malware and suspicious applications. We refer to such software as privacy leak software (PLS). Nowadays, PLS has become a serious and challenging problem to cyber security. Previous methodologies are of two categories: one focuses on the outbound network traffic of the applications; the other dives into the inside information flow of the applications. We present an abstract model called Privacy Petri Net (PPN) which is more applicable to various applications and more intuitive and vivid to users. We apply our approach to both malware and suspicious applications in real world. The experimental result shows that our approach can effectively find categories, content, procedure, destination and severity of the private information leaks for the target software.

     

/

返回文章
返回