Privacy Petri Net and Privacy Leak Software
Private information leak behavior has been widely discovered in malware and suspicious applications. We refer to such software as privacy leak software (PLS). Nowadays, PLS has become a serious and challenging problem to cyber security. Previous methodologies are of two categories: one focuses on th...
Saved in:
Published in: | Journal of computer science and technology Vol. 30; no. 6; pp. 1318 - 1343 |
---|---|
Main Author: | |
Format: | Journal Article |
Language: | English |
Published: |
New York
Springer US
01-11-2015
Springer Nature B.V National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, China%Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China%Department of Computer Science and Technology, Tsinghua University, Beijing 100083, China |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Private information leak behavior has been widely discovered in malware and suspicious applications. We refer to such software as privacy leak software (PLS). Nowadays, PLS has become a serious and challenging problem to cyber security. Previous methodologies are of two categories: one focuses on the outbound network traffic of the applications; the other dives into the inside information flow of the applications. We present an abstract model called Privacy Petri Net (PPN) which is more applicable to various applications and more intuitive and vivid to users. We apply our approach to both malware and suspicious applications in real world. The experimental result shows that our approach can effectively find categories, content, procedure, destination and severity of the private information leaks for the target software. |
---|---|
Bibliography: | privacy Petri net, privacy leak software, privacy function, private information, malware analysis 11-2296/TP Private information leak behavior has been widely discovered in malware and suspicious applications. We refer to such software as privacy leak software (PLS). Nowadays, PLS has become a serious and challenging problem to cyber security. Previous methodologies are of two categories: one focuses on the outbound network traffic of the applications; the other dives into the inside information flow of the applications. We present an abstract model called Privacy Petri Net (PPN) which is more applicable to various applications and more intuitive and vivid to users. We apply our approach to both malware and suspicious applications in real world. The experimental result shows that our approach can effectively find categories, content, procedure, destination and severity of the private information leaks for the target software. Le-Jun Fan,Yuan-Zhuo Wang, Jing-Yuan Li, Xue-Qi Cheng,Chuang Lin(1. National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, China; 2.Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China; 3.Department of Computer Science and Technology, Tsinghua University, Beijing 100083, China) ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ISSN: | 1000-9000 1860-4749 |
DOI: | 10.1007/s11390-015-1601-7 |