期刊文献+

Privacy Petri Net and Privacy Leak Software 被引量:2

Privacy Petri Net and Privacy Leak Software
原文传递
导出
摘要 Private information leak behavior has been widely discovered in malware and suspicious applications. We refer to such software as privacy leak software (PLS). Nowadays, PLS has become a serious and challenging problem to cyber security. Previous methodologies are of two categories: one focuses on the outbound network traffic of the applications; the other dives into the inside information flow of the applications. We present an abstract model called Privacy Petri Net (PPN) which is more applicable to various applications and more intuitive and vivid to users. We apply our approach to both malware and suspicious applications in real world. The experimental result shows that our approach can effectively find categories, content, procedure, destination and severity of the private information leaks for the target software. Private information leak behavior has been widely discovered in malware and suspicious applications. We refer to such software as privacy leak software (PLS). Nowadays, PLS has become a serious and challenging problem to cyber security. Previous methodologies are of two categories: one focuses on the outbound network traffic of the applications; the other dives into the inside information flow of the applications. We present an abstract model called Privacy Petri Net (PPN) which is more applicable to various applications and more intuitive and vivid to users. We apply our approach to both malware and suspicious applications in real world. The experimental result shows that our approach can effectively find categories, content, procedure, destination and severity of the private information leaks for the target software.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2015年第6期1318-1343,共26页 计算机科学技术学报(英文版)
基金 This work is supported by the National Natural Science Foundation of China under Grant Nos. 61402124, 61402022, 61173008, 60933005, and 61572469, the National Key Technology Research and Development Program of China under Grant No. 2012BAH39B02, the 242 Projects of China under Grant No. 2011F45, and Beijing Nova Program under Grant No. Z121101002512063.
关键词 privacy Petri net privacy leak software privacy function private information malware analysis privacy Petri net, privacy leak software, privacy function, private information, malware analysis
  • 相关文献

参考文献45

  • 1Backes M, Kopf B, Rybalchenko A. Automatic discovery and quantification of information leaks. In Proc. the 30th IEEE Symposium on Security and Privacy, May 2009, pp.141-153.
  • 2Borders K, Prakash A. Quantifying information leaks in outbound Web traffic. In Proc. the sou. IEEE Symposium on Security and Privacy, May 2009, pp.129-140.
  • 3Jung J, Sheth A, Greenstein B, Wetherall D, Maganis G, Kohno T. Privacy oracle: A system for finding application leaks with black box differential testing. In Proc. the 15th ACM Conference on Computer and Communications Security, Oct. 2008, pp.279-288.
  • 4Egele M, Kruegel C, Kirda E, Vigna G. PiOS: Detecting privacy leaks in lOS applications. In Proc. the 18th Annual Network & Distributed System Security Symposium, Feb. 2011.
  • 5Enck W, Gilbert P, Chun B G, Cox L P, Jung J, McDaniel P, Sheth A. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proc. the 9th USENIX Symposium on Operating Systems Design and Implementation, Oct. 2010, pp.393-407.
  • 6Kirda E, Kruegel C. Behavior-based spyware detection. In Proc. the 15th USENIX Security Symposium, July 31- August 4, 2006.
  • 7Egele M, Kruegel C, Kirda E, Yin H, Song D. Dynamic spyware analysis. In Proc. the 2007 USENIX Annual Technical Conference, June 2007, pp.233-246.
  • 8Kruegel C, Kirda E, Mutz D, Robertson W, Vigna G. Polymorphic worm detection using structural information of executables. In Proc. the 8th International Symposium on Recent Advances in Intrusion Detection, Sept. 2005, pp.207- 226.
  • 9Kinder J, Katzenbeisser S, Schallhart C, Veith H. Detecting malicious code by model checking. In Proc. the 2nd International Conference on Detection of Intrusions and Moluiare and Vulnerability Assessment, July 2005, pp.174-187.
  • 10Kruegel C, Robertson W, Vigna G. Detecting kernel-level rootkits through binary analysis. In Proc. the 20th Annual Computer Security Applications Conference, Dec. 2004, pp.91-100.

同被引文献4

引证文献2

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部