期刊文献+

Android应用隐私泄露静态代码分析 被引量:10

Static Code Analysis of Adroid Applications Information Leakage
在线阅读 下载PDF
导出
摘要 Android平台的应用安全问题日益引起大家的重视,用户隐私泄漏显得尤其严重。本文从代码层面对常见的隐私信息读取以及泄露方式进行了研究并提出了相应的代码特征。提出了一种新的基于代码静态分析技术检测Android应用隐私泄露的方案。该方案基于DTS静态分析框架进行了改造,将隐私泄露作为一类缺陷模式,进而实现了检测Android应用的隐私泄露的系统,并进行了实验验证。 Security of Android applications causes people's attention increasingly,especially user privacy leakage.This article studies the common privacy information read and leak mode form code level and puts forward the corresponding code features.This paper proposes a new solution based on static analysis technical to detect android applications' privacy leakage.The scheme reforms the framework based on DTS static analysis and considers privacy leakage as a kind of defect mode,so as to realize the detection of Android applications privacy leakage system.At last,validate the system by experiment.
出处 《软件》 2012年第10期1-5,共5页 Software
基金 国家"八六三"高技术研究发展计划基金项目(2012AA011201)
关键词 计算机软件 隐私泄露 静态分析 ANDROID应用 Computing Software Information leakage Static analysis Android application
  • 相关文献

参考文献8

二级参考文献22

  • 1夏一民,罗军,张民选.基于静态分析的安全漏洞检测技术研究[J].计算机科学,2006,33(10):279-282. 被引量:30
  • 2ZHANG Xiao Lan,EDWARDS A.Using CQUAL for static analysis of authorization hook [ C ]. Usenix security symposium, USA, 2002.
  • 3JOHNSON R, WAGNER D.Finding user/kernel pointer bugs with type inference[C].Usenix security symposium,2004.
  • 4XIE Yi Chen,CHOU A,ARCHER E D.Using symbolic pathsensitive analysis to detect memory access errors[C].ESEC/FSE ' 03, helsinki, finland, Sep 2003.
  • 5白哥乐,宫云战,杨朝红.基于源码分析的软件安全测试工具综述[C].第五届中国测试学术会议,2008.
  • 6Ball T, Bounimova E, Cook B, et al. Thorough static analysis of device drivers [ C ]//2006 EuroSys Conference. New York: Association for Computing Machinery, 2006 : 73-85.
  • 7Yang Junfeng, Sar Can, Engler Dawson. Explode: a lightweight, general system for finding serious storage system errors[C]//Tth USENIX Symposium on Operating Systems Design and Implementation. [ S. l. ]: USENIX ASSOC, 2006: 131-146.
  • 8Engler D, Chelf B, Chou A, et al. Checking system rules using system-specific, programmer-written compiler extensions [C]//Proceedings of the 4th Conference on Symposium on Operating System Design & Implementation. [S.l. ] : USENIX Association, 2000: 1-16.
  • 9Ashcraft K, Engler D. Using programmer-written compiler extensions to catch security holes[C]//2002 Symposium on Security and Privacy. [S. l. ] : Institute of Electrical and Electronics Engineers Inc, 2002: 143-159.
  • 10Hovemeyer D, Pugh W. Finding bugs is easy[J]. ACM SIGPLAN Notices, 2004, 39(12) : 92-106.

共引文献64

同被引文献118

引证文献10

二级引证文献82

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部