Privacy Petri Net and Privacy Leak Software

Private information leak behavior has been widely discovered in malware and suspicious applications. We refer to such software as privacy leak software (PLS). Nowadays, PLS has become a serious and challenging problem to cyber security. Previous methodologies are of two categories: one focuses on th...

Full description

Saved in:
Bibliographic Details
Published in:Journal of computer science and technology Vol. 30; no. 6; pp. 1318 - 1343
Main Author: 范乐君 王元卓 李静远 程学旗 林闯
Format: Journal Article
Language:English
Published: New York Springer US 01-11-2015
Springer Nature B.V
National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, China%Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China%Department of Computer Science and Technology, Tsinghua University, Beijing 100083, China
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Private information leak behavior has been widely discovered in malware and suspicious applications. We refer to such software as privacy leak software (PLS). Nowadays, PLS has become a serious and challenging problem to cyber security. Previous methodologies are of two categories: one focuses on the outbound network traffic of the applications; the other dives into the inside information flow of the applications. We present an abstract model called Privacy Petri Net (PPN) which is more applicable to various applications and more intuitive and vivid to users. We apply our approach to both malware and suspicious applications in real world. The experimental result shows that our approach can effectively find categories, content, procedure, destination and severity of the private information leaks for the target software.
Bibliography:privacy Petri net, privacy leak software, privacy function, private information, malware analysis
11-2296/TP
Private information leak behavior has been widely discovered in malware and suspicious applications. We refer to such software as privacy leak software (PLS). Nowadays, PLS has become a serious and challenging problem to cyber security. Previous methodologies are of two categories: one focuses on the outbound network traffic of the applications; the other dives into the inside information flow of the applications. We present an abstract model called Privacy Petri Net (PPN) which is more applicable to various applications and more intuitive and vivid to users. We apply our approach to both malware and suspicious applications in real world. The experimental result shows that our approach can effectively find categories, content, procedure, destination and severity of the private information leaks for the target software.
Le-Jun Fan,Yuan-Zhuo Wang, Jing-Yuan Li, Xue-Qi Cheng,Chuang Lin(1. National Computer Network Emergency Response Technical Team/Coordination Center of China, Beijing 100029, China; 2.Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China; 3.Department of Computer Science and Technology, Tsinghua University, Beijing 100083, China)
ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:1000-9000
1860-4749
DOI:10.1007/s11390-015-1601-7