[go: up one dir, main page]

CN103309808A - Label-based black box detection method and system for privacy disclosure of Android user - Google Patents

Label-based black box detection method and system for privacy disclosure of Android user Download PDF

Info

Publication number
CN103309808A
CN103309808A CN2013102340431A CN201310234043A CN103309808A CN 103309808 A CN103309808 A CN 103309808A CN 2013102340431 A CN2013102340431 A CN 2013102340431A CN 201310234043 A CN201310234043 A CN 201310234043A CN 103309808 A CN103309808 A CN 103309808A
Authority
CN
China
Prior art keywords
android
label
data
privacy
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013102340431A
Other languages
Chinese (zh)
Other versions
CN103309808B (en
Inventor
张妍
周启慧
汪丹
吴晓昕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Institute of Information Engineering of CAS
Original Assignee
Huawei Technologies Co Ltd
Institute of Information Engineering of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd, Institute of Information Engineering of CAS filed Critical Huawei Technologies Co Ltd
Priority to CN201310234043.1A priority Critical patent/CN103309808B/en
Publication of CN103309808A publication Critical patent/CN103309808A/en
Priority to PCT/CN2014/077139 priority patent/WO2014198171A1/en
Application granted granted Critical
Publication of CN103309808B publication Critical patent/CN103309808B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本发明涉及一种基于标签的安卓用户隐私泄露黑盒检测方法及系统,检测步骤为:1)对安卓用户终端创建用户隐私数据并将类别标签添加到所述用户隐私数据中;2)在安卓用户终端安装不少于一个待检测应用程序并触发所述待检测应用程序;3)在Internet,蓝牙,短消息网络出口检测所述应用程序向外发送的数据包中携带的类别标签;4)根据所述数据包中携带的类别标签判断隐私数据类别,记录结果。节省了大量指令分析和污点传播的时间,也避免了为应用程序所有指令中的变量和计算时的中间变量,同时节省了大量的内存开销。

The present invention relates to a label-based Android user privacy leakage black-box detection method and system. The detection steps are: 1) create user privacy data for an Android user terminal and add a category label to the user privacy data; The user terminal installs no less than one application program to be detected and triggers the application program to be detected; 3) Detects the category label carried in the data packet sent by the application program at the exit of the Internet, Bluetooth, and short message network; 4) Judging the category of the private data according to the category label carried in the data packet, and recording the result. It saves a lot of time for instruction analysis and taint propagation, and also avoids variables in all instructions of the application and intermediate variables during calculation, and saves a lot of memory overhead.

Description

基于标签的安卓用户隐私泄露黑盒检测方法及系统Tag-based Black Box Detection Method and System for Android User Privacy Leakage

技术领域 technical field

本发明涉及安卓用户隐私信息检测,尤其涉及一种基于事先设定的标签检测安卓应用程序是否将某类用户隐私数据向外发送的方法及其实施系统,属于移动终端安全领域。  The invention relates to the detection of Android user privacy information, in particular to a method and an implementation system for detecting whether an Android application program sends out certain user privacy data based on a pre-set label, and belongs to the field of mobile terminal security. the

背景技术 Background technique

目前,信息技术已进入移动互联网时代,智能移动终端由于其便携性、成本低等优点日益成为用户进行各类网络活动的主要终端形态。相比传统移动终端,智能移动终端拥有更高性能的处理器、更大的存储空间、更高的移动网络数据传输能力以及开放的第三方移动终端操作系统,因此借助智能移动终端可以开展大量业务应用,处理更多的个人隐私数据。这些数据,如通话与短信信息,地理位置,社交网络账户,银行帐号,个人密码,照片视频等等,均以直接或间接的方式与金钱利益挂钩,从而吸引了众多攻击者的注意力,导致隐私窃取类恶意软件增长速度惊人,根据网秦发布的《2012年上半年全球手机安全报告》中的数据显示,2012年上半年查杀到手机恶意软件17676款,相比2011年下半年增长42%,感染手机1283万部,其中隐私窃取类占据了23.2%的感染比例。为全面保护用户的隐私与财产安全,推动智能移动设备的发展,智能移动终端隐私防护技术的研究已成为产业界和学术界共同关注的方向。  At present, information technology has entered the mobile Internet era, and smart mobile terminals have increasingly become the main terminal form for users to conduct various network activities due to their portability and low cost. Compared with traditional mobile terminals, smart mobile terminals have higher-performance processors, larger storage space, higher mobile network data transmission capabilities, and open third-party mobile terminal operating systems, so a large number of businesses can be carried out with the help of smart mobile terminals applications to process more personal privacy data. These data, such as calls and text messages, geographic locations, social network accounts, bank account numbers, personal passwords, photos and videos, etc., are directly or indirectly linked to monetary interests, thus attracting the attention of many attackers, resulting in The growth rate of privacy-stealing malware is astonishing. According to the data in the "Global Mobile Security Report for the First Half of 2012" released by Netqin, 17,676 types of mobile malware were detected and killed in the first half of 2012, an increase of 42% compared to the second half of 2011. %, 12.83 million mobile phones were infected, of which privacy theft accounted for 23.2% of the infections. In order to fully protect the privacy and property security of users and promote the development of smart mobile devices, the research on privacy protection technology of smart mobile terminals has become the direction of common concern in the industry and academia. the

数据流追踪控制是智能移动终端隐私防护的重要方向之一,目前的数据流追踪控制方案为敏感隐私数据设置污点标签,监测安卓应用程序中处理隐私数据的指令运行,设定规则保证污点标签在数据处理过程中有效传播,从而跟踪隐私数据的流向,直至数据流离开手机的各种渠道,防止隐私数据的非授权泄漏。2010年Intel实验室,宾夕法尼亚实验室,以及杜克大学联合开发了应用于安卓上的TaintDroid系统,该系统利用了安卓的DVM虚拟机架构,对其进行轻量级扩展以进行四个级别的污点追踪;同年,Georgios等研究者们开发了Paranoid Android系统,利用虚拟机录制与重放技术,将Android运行状态复制并传递给远程服务器,在服务器上运行病毒查杀和污点传播检测,对隐私泄漏和其它恶意入侵行为进行检测。  Data flow tracking control is one of the important directions of privacy protection for smart mobile terminals. The current data flow tracking control scheme sets taint labels for sensitive private data, monitors the execution of commands that process private data in Android applications, and sets rules to ensure that taint labels are in Effective dissemination during data processing, so as to track the flow of private data until the data flow leaves various channels of the mobile phone, preventing unauthorized leakage of private data. In 2010, Intel Labs, Pennsylvania Labs, and Duke University jointly developed the TaintDroid system for Android, which uses Android's DVM virtual machine architecture and performs lightweight extensions to perform four levels of taint. Tracking; in the same year, Georgios and other researchers developed the Paranoid Android system, using virtual machine recording and replay technology to copy and transmit the Android running state to a remote server, run virus killing and stain propagation detection on the server, and protect privacy leaks and other malicious intrusions. the

然而现有安卓数据流追踪隐私检测方案采用的是数据流白盒追踪,需要在虚拟机中实时截获并分析每一条指令的运行(如数据加减运算,数据字符串变形,数据拷贝等),并在系统中另外开辟大量内存,存储和传播数据源和中间数据的污点标签,才能跟踪隐私数据流,检测出隐私数据。此种方式给计算资源本就受限的移动终端带来大量的性能消耗,影响用户体验。目前在智能移动终端领域,还不存在一种无需实时监控指令的高效隐私数据流追踪方法。 通常在每一个应用程序运行的过程中,涉及指令操作往往具有百条、千条、万条甚至更高的数量级,采用逐条指令分析追踪数据流的白盒方式,将带来大量的时间和内存开销。此外,许多应用程序向外发送用户的隐私数据时,通常只是简单读取拷贝和发送,极少浪费过多的运行时间和计算资源对其进行变形和加密。  However, the existing Android data flow tracking privacy detection scheme uses data flow white-box tracking, which needs to intercept and analyze the operation of each instruction in the virtual machine in real time (such as data addition and subtraction, data string deformation, data copy, etc.), In addition, a large amount of memory is opened up in the system to store and disseminate the taint labels of data sources and intermediate data, so as to track the flow of private data and detect private data. This method brings a lot of performance consumption to the mobile terminal whose computing resources are already limited, and affects user experience. At present, in the field of smart mobile terminals, there is no efficient privacy data flow tracking method that does not require real-time monitoring instructions. Usually, during the running of each application program, the operations involved in instructions often have hundreds, thousands, tens of thousands or even higher orders of magnitude. Using the white box method of analyzing and tracking data flow one by one will bring a lot of time and memory. overhead. In addition, when many applications send the user's private data to the outside world, they usually just read, copy and send it, and rarely waste too much running time and computing resources to deform and encrypt it. the

发明内容 Contents of the invention

本发明的目的在于构建一种基于标签的安卓用户隐私数据黑盒追踪检测方法及系统,采用黑盒快速追踪的方式,在源头为不同类型的用户数据设置类型特征标签,随后安装待检测应用程序,并自动触发应用行为,将数据在应用程序内部的所有处理过程视为黑盒,不予干涉。仅在网络信息出口处,拦截外传数据,检测出带有标签的数据包,判定应用程序向外发送何种隐私数据。  The purpose of the present invention is to construct a label-based Android user privacy data black-box tracking detection method and system, adopting the black-box fast tracking method, setting type feature labels for different types of user data at the source, and then installing the application program to be detected , and automatically triggers the application behavior, treats all data processing within the application as a black box and does not interfere. Only at the exit of network information, the external data is intercepted, the data packets with labels are detected, and the private data sent by the application is determined. the

为了实现上述目的,本发明采用如下技术方案——基于标签的安卓用户隐私泄露黑盒检测方法,包括如下步骤:  In order to achieve the above object, the present invention adopts the following technical solution—a label-based Android user privacy leak black-box detection method, including the following steps:

1)对安卓用户终端创建用户隐私数据并将类别标签添加到所述用户隐私数据中;  1) Create user privacy data for Android user terminals and add category tags to the user privacy data;

2)在安卓用户终端安装不少于一个待检测应用程序并触发所述待检测应用程序;  2) Install no less than one application program to be detected on the Android user terminal and trigger the application program to be detected;

3)在数据出口检测所述应用程序向外发送的数据包中携带的类别标签;  3) Detect the category label carried in the data packet sent by the application at the data export;

4)根据所述数据包中携带的类别标签判断隐私数据类别。  4) Determine the category of the private data according to the category label carried in the data packet. the

更进一步,所述网络出口为Internet或蓝牙或短消息中的一种或多种。  Furthermore, the network outlet is one or more of Internet, Bluetooth or short message. the

可选地,所述用户隐私数据包括但不限于:联系人列表、应用程序列表、短消息内容、SD卡文本数据、日志信息、GPS地理位置信息,IMEI设备号,蓝牙MAC地址,WiFi MAC地址,最近通话。或者可由用户定义,可以是一个大类,如联系人列表,也可以挑选其中的部分联系人信息组成一个小类。  Optionally, the user privacy data includes but is not limited to: contact list, application program list, short message content, SD card text data, log information, GPS geographic location information, IMEI device number, Bluetooth MAC address, WiFi MAC address , most recent calls. Or it can be defined by the user, which can be a large category, such as a contact list, or select part of the contact information to form a subcategory. the

可选地,所述类别标签根据用户隐私数据类型设定一个或多个编码字符串。  Optionally, the category label sets one or more coded strings according to the type of user privacy data. the

更进一步,所述待检测应用程序通过手动或者自动方式安装:  Furthermore, the application program to be detected is installed manually or automatically:

所述手动安装由检测人员在安卓终端手动安装一个或一批待测应用程序并逐一打开安装好的待测应用程序;  The manual installation is manually installed by a tester on an Android terminal or a batch of application programs to be tested and opened one by one the installed application programs to be tested;

所述自动安装通过安卓系统已有的自动化安装和/或测试的工具连接到安卓用户终端,自动安装一个或一批待测应用程序,并随机性模拟用户行为自动触发应用功能。  The automatic installation is connected to the Android user terminal through an existing automated installation and/or testing tool of the Android system, automatically installs one or a batch of application programs to be tested, and randomly simulates user behavior to automatically trigger application functions. the

可选地,所述安卓用户终端为可调试智能终端设备:手机、平板电脑、电视的一种或者多种。  Optionally, the Android user terminal is a debuggable intelligent terminal device: one or more of a mobile phone, a tablet computer, and a TV. the

更进一步,在所述Internet,蓝牙,短消息网络出口检测所述应用程序向外发送的数据包 为:安卓系统上安装的待测应用程序通过调用安卓系统核心库中网络套接字接口函数,向外部Internet地址发送的数据包。  Furthermore, at the Internet, bluetooth, the short message network outlet detects that the data packet sent by the application program is: the application program to be tested installed on the Android system is by calling the network socket interface function in the core library of the Android system, A packet sent to an external Internet address. the

更进一步,所述在Internet,蓝牙,短消息网络出口检测数据包是否携带标签的方法为:  Further, described in Internet, bluetooth, the method that the short message network exit detects whether data packet carries label is:

1)在安卓底层负责向Internet,蓝牙网络发送数据包的接口函数里,以及负责向外部电话号码发送短消息的接口函数里,通过添加模块函数比对包发送者的标识信息,截获待测批次中的应用程序通过接口函数将要发送的数据包;  1) In the interface function responsible for sending data packets to the Internet and Bluetooth network at the bottom layer of Android, and in the interface function responsible for sending short messages to external phone numbers, by adding module functions to compare the identification information of the packet sender, intercept the batch to be tested The data packets to be sent by the application program through the interface function;

2)取出各类用户数据的类别标签集合,采用字符串比对方式,检测数据包是否包含某些类别标签,若该数据包字符串至少包含某类用户数据类别标签集合中的一个类别标签,则该数据包携带了该类用户数据。  2) Take out the category label set of various user data, and use the string comparison method to detect whether the data packet contains certain category labels. If the data packet string contains at least one category label in the category label set of a certain type of user data, Then the data packet carries this type of user data. the

更进一步,若数据包携带该类用户数据,则记录检测结果包括:据中的数据包内容、所携带的类别标签、类别标签所属类别以及数据包发送时间、发送数据包的应用程序名。  Furthermore, if the data packet carries this type of user data, the recorded detection result includes: the content of the data packet in the data, the category label carried, the category to which the category label belongs, the sending time of the data packet, and the name of the application program that sent the data packet. the

更进一步,使用安卓内部数据库工具创建一检测结果数据库用于储存所述检测结果。  Furthermore, an Android internal database tool is used to create a detection result database for storing the detection results. the

本发明还提出一种基于标签的安卓用户隐私泄露黑盒检测系统,包括:  The present invention also proposes a label-based Android user privacy leakage black-box detection system, including:

用于对安卓用户终端创建用户隐私数据并将类别标签添加到所述用户隐私数据中的装置;  A device for creating user privacy data for an Android user terminal and adding a category label to the user privacy data;

用于在安卓用户终端安装不少于一个待检测应用程序并触发所述待检测应用程序的装置;  A device for installing no less than one application program to be detected on an Android user terminal and triggering the application program to be detected;

用于在Internet,蓝牙,短消息网络出口检测所述应用程序向外发送的数据包中携带的类别标签的装置;  A device for detecting the category label carried in the data packet sent out by the application at the Internet, Bluetooth, and short message network exits;

用于根据所述数据包中携带的类别标签判断隐私数据类别,记录结果的装置;  A device for judging the category of private data according to the category label carried in the data packet, and recording the result;

以及类型标签数据库和检测结果数据库。  As well as a type label database and a detection result database. the

本发明的有益效果  Beneficial effects of the present invention

本发明的方法简单地在数据流出口处对数据进行基于数据类别标签的检测,节省了大量指令分析和污点传播的时间,也避免了为应用程序所有指令中的变量和计算时的中间变量,以及寄存器开辟专门的内存空间以供污点存储和传播,节省了大量的内存开销。  The method of the present invention simply detects the data based on the data category label at the data flow outlet, which saves a lot of time for instruction analysis and stain propagation, and also avoids the variables in all instructions of the application program and the intermediate variables during calculation. And registers open up a special memory space for taint storage and propagation, saving a lot of memory overhead. the

附图说明 Description of drawings

图1为本发明方法基于标签的安卓用户隐私泄露黑盒检测系统的架构示意图。  FIG. 1 is a schematic diagram of the architecture of a tag-based Android user privacy leakage black-box detection system according to the present invention. the

具体实施方式 Detailed ways

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描 述,可以理解的是,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。在本发明一实施例中,检测方法如下:  The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. It can be understood that the described embodiments are only part of the embodiments of the present invention, not all Example. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention. In an embodiment of the present invention, the detection method is as follows:

1)在安卓终端测试机上创建携带类别标签的各类用户隐私数据,并将类别标签存入类别标签数据库。  1) Create various user privacy data with category labels on the Android terminal test machine, and store the category labels in the category label database. the

2)自动或手动安装待测应用程序,自动或手动触发应用程序行为。  2) Automatically or manually install the application to be tested, and automatically or manually trigger application behavior. the

3)在Internet,蓝牙,短消息网络出口检测待测应用程序向外发送的数据包中是否携带标签,携带何种标签。  3) At the Internet, Bluetooth, and short message network exits, detect whether and what kind of label is carried in the data packet sent out by the application to be tested. the

4)若检测到携带标签,将检测结果记录进安卓终端测试机内部的检测结果数据库中。  4) If a tag is detected, record the test result into the test result database inside the Android terminal tester. the

5)测试人员可通过查看检测结果数据库文件,或通过使用预先开发的安装于安卓终端测试机上的检测结果数据库读取软件查看单个或多个待测软件的检测结果。  5) Testers can view the test results of single or multiple software under test by viewing the test result database file, or by using the pre-developed test result database reading software installed on the Android terminal test machine. the

在本发明一实施例中,所述安卓终端测试机是操作系统为安卓的智能手机,平板,电视等可调试智能终端设备。所述待测应用程序包括国内外安卓应用市场上可供免费或付费下载的面向安卓智能手机,平板,电视的应用程序,以及从其它渠道获得的安卓应用程序。  In an embodiment of the present invention, the Android terminal testing machine is a debuggable intelligent terminal device such as a smart phone, a tablet, and a TV whose operating system is Android. Described application program to be tested comprises the application program facing Android smart phones, flat panels, TVs available for free or paid download on the Android application market at home and abroad, and the Android application program obtained from other channels. the

在本发明一实施例中,所述用户数据包括联系人列表,应用程序列表,短消息内容,SD卡文本数据,日志信息,GPS地理位置信息。所述用户数据类别的粒度可由检测人员自行定义,如可将短消息内容视为一个用户类别,也可将其划分为三个用户类别:收件箱短消息,发件箱短消息,草稿箱短消息。  In an embodiment of the present invention, the user data includes a contact list, an application program list, short message content, SD card text data, log information, and GPS location information. The granularity of the user data category can be defined by the testing personnel. For example, the content of the short message can be regarded as a user category, and it can also be divided into three user categories: short messages in the inbox, short messages in the outbox, and draft boxes. short message. the

在本发明一实施例中,所述在安卓终端测试机上创建携带类别标签的用户隐私数据的方法为,依托安卓系统自带应用,安卓市场应用或自行开发的安卓应用,编辑携带类别标签的用户数据内容,存入安卓终端测试机。  In an embodiment of the present invention, the method for creating user privacy data carrying category tags on the Android terminal testing machine is to edit users carrying category tags by relying on the Android system's own application, Android market application or self-developed Android application The data content is stored in the Android terminal test machine. the

所述类别标签,是指每种类别的用户数据特有的一个或多个特征字符串,其形式可为特殊词组,也可为无意义的字符组合。  The category label refers to one or more characteristic character strings unique to each category of user data, and its form may be a special phrase or a meaningless combination of characters. the

在本发明另一实施例中,类别标签为利用安卓系统自带的Contact联系人应用程序,编辑数条联系人信息,其联系人姓名后统一加入“#SecretContact#”,联系人电话统一设置为“13333333333”,{“#SecretContact#”,“13333333333”}作为联系人数据的类别标签集。  In another embodiment of the present invention, the category label is to use the Contact contact application program that comes with the Android system to edit several contact information, add "#SecretContact#" uniformly after the contact name, and the contact phone number is uniformly set to "13333333333", {"#SecretContact#", "13333333333"} as a set of category tags for contact data. the

在本发明一实施例中,所述手动安装待测应用程序和触发应用程序行为,是指由参与检测的工作人员在安卓终端测试机上手动安装一个或一批待测应用程序,随后逐一打开安装好的待测应用程序,尽可能全面地触发其各种应用功能。  In an embodiment of the present invention, the manual installation of the application program to be tested and the triggering of the application program behavior refer to the manual installation of one or a batch of application programs to be tested on the Android terminal testing machine by the staff participating in the detection, and then open the installation program one by one. A good application under test triggers its various application functions as comprehensively as possible. the

在本发明一实施例中,所述自动安装待测应用程序和触发应用程序行为,是指借助安卓自身已有的一些自动化安装和测试的工具,编写计算机程序脚本,连接安卓终端测试机,自 动安装一个或一批待测应用程序,并随机性地模拟用户行为自动触发其各种应用功能。  In one embodiment of the present invention, the automatic installation of the application program to be tested and the triggering of the application program behavior refer to writing computer program scripts with the help of some existing automatic installation and testing tools of Android itself, connecting the Android terminal testing machine, and automatically Automatically install one or a batch of application programs to be tested, and randomly simulate user behavior to automatically trigger various application functions. the

在本发明另一实施例中,需要检测的通过Internet,蓝牙,短消息网络出口向外发送的数据包为安卓系统上安装的待测应用程序,调用安卓系统核心库中网络套接字接口函数,向外部Internet地址,蓝牙地址,电话号码发送的数据消息包。  In another embodiment of the present invention, what needs to be detected is through the Internet, bluetooth, and the data packet sent out by the short message network outlet is the application program to be tested installed on the Android system, and calls the network socket interface function in the core library of the Android system , A data message packet sent to an external Internet address, Bluetooth address, or phone number. the

在本发明一实施例中在Internet,蓝牙,短消息网络出口检测数据包是否携带标签的方法为:  In one embodiment of the present invention, in Internet, bluetooth, the method that short message network exit detects whether data packet carries label is:

1)在安卓底层代码文件中负责向Internet,蓝牙网络发送数据包的接口函数里,以及负责向外部电话号码发送短消息的接口函数里,通过添加模块函数比对包发送者的标识信息,截获待测批次中的应用程序通过接口函数将要发送的数据包;  1) In the interface function responsible for sending data packets to the Internet and Bluetooth network in the Android underlying code file, and in the interface function responsible for sending short messages to external phone numbers, compare the identification information of the packet sender by adding module functions, and intercept The data packets to be sent by the application program in the batch to be tested through the interface function;

2)取出各类用户数据的类别标签集合,采用字符串比对方式,检测数据包是否包含某些类别标签,若该数据包字符串至少包含某类用户数据类别标签集合中的一个类别标签,则该数据包携带了该类用户数据。  2) Take out the category label set of various user data, and use the string comparison method to detect whether the data packet contains certain category labels. If the data packet string contains at least one category label in the category label set of a certain type of user data, Then the data packet carries this type of user data. the

所述检测结果数据库实现形式可以为但不仅限于使用安卓内部自带的sqlite数据库工具预先创建。  The implementation form of the test result database may be, but not limited to, pre-created by using the built-in sqlite database tool in Android. the

如图1所示是本发明基于标签的安卓用户隐私泄露黑盒检测系统的架构示意图,其中,该系统包括测试前端和测试后端。测试前端架设在安卓终端测试机上,包括数据出口监测组件,与检测结果数据库写入组件,以及类型标签数据库与检测结果数据库两个数据库。数据出口监测组件负责拦截网络外送数据包,检测其是否携带类型标签数据库中记录的类型标签。检测结果数据库写入组件,负责向检测结果数据库中写入检测到携带了标签的数据包及其相关信息。  As shown in FIG. 1 , it is a schematic diagram of an architecture of a tag-based Android user privacy leakage black-box detection system of the present invention, wherein the system includes a test front-end and a test back-end. The test front end is set up on the Android terminal test machine, including the data export monitoring component, the test result database writing component, and two databases, the type label database and the test result database. The data export monitoring component is responsible for intercepting the outgoing data packets from the network and detecting whether they carry the type labels recorded in the type label database. The detection result database writing component is responsible for writing the detected data packets carrying tags and related information into the detection result database. the

测试后端架设在一台计算机上,通过USB调试接口连接安卓终端测试机,主要包括类型标签写入组件,自动化安装和调试脚本组件,以及检测结果数据读取组件。其中类型标签集写入组件,向测试人员提供了向测试终端机类型标签数据库中存储预先编辑的类型标签集的功能,检测结果数据库读取组件,具备从终端测试机的检测结果数据库中读取,查询和展示检测结果的能力。  The test backend is set up on a computer and connected to the Android terminal test machine through the USB debugging interface, mainly including the type label writing component, the automatic installation and debugging script component, and the test result data reading component. Among them, the type label set writing component provides testers with the function of storing pre-edited type label sets in the type label database of the test terminal, and the test result database reading component is capable of reading from the test result database of the terminal tester , the ability to query and display test results. the

下面将给出本发明的一个具体实例,对本发明中的技术方案进行清楚、完整地描述,可以理解的是,所描述的实例仅仅是本发明一部分实例,而不是全部的实施例。基于本发明中的实施例,本领域技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。  A specific example of the present invention will be given below to describe the technical solution in the present invention clearly and completely. It should be understood that the described example is only a part of the examples of the present invention, rather than all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention. the

本实例描述测试人员在测试终端机上为联系人列表,短信,IMEI设备号,GPS位置,SD卡文件创建携带类别标签的用户隐私数据,并检测某一应用程序对这些类别的用户隐私数据 的泄漏情况的过程,如表1所示:  This example describes how testers create user privacy data with category labels for contact list, SMS, IMEI device number, GPS location, and SD card files on the test terminal, and detect the leakage of user privacy data of these categories by an application The process of the situation is shown in Table 1:

1测试人员启动测试终端机,并将其连接到可对其发送指令的测试电脑上  1 The tester starts the test terminal and connects it to the test computer that can send instructions to it

2测试人员为联系人列表,短信,IMEI设备号,GPS位置,SD卡文件创建携带类别标签的用户隐私数据:  2 Testers create user privacy data with category labels for contact list, SMS, IMEI device number, GPS location, and SD card files:

3测试人员调用类型标签写入组件将上述类型标签写入测试终端机类型标签数据库。  3. The tester invokes the type label writing component to write the above type label into the test terminal type label database. the

4测试人员调用脚本程序在测试终端机上安装一批指定待测软件,并自动触发它们的各种软件行为。  4. The tester calls the script program to install a batch of specified software to be tested on the test terminal, and automatically triggers their various software behaviors. the

5在软件行为触发过程中,该批软件有向外部Internet地址发送数据包,则该数据包将在底层被拦截,检测其是否携带事先设定的类型标签。若有携带,则记录进数据库。  5. During the software behavior triggering process, if the batch of software sends data packets to external Internet addresses, the data packets will be intercepted at the bottom layer to detect whether they carry the pre-set type tags. If it is carried, it will be recorded in the database. the

6自动触发脚本程序结束停止运行后,测试人员可在测试后端计算机上通过启动检测结果数据库读取组件查看待测软件的隐私泄露情况报告。  6. After the automatic trigger script program ends and stops running, the tester can view the privacy leakage report of the software under test by starting the detection result database reading component on the test back-end computer. the

表1  Table 1

Figure 2013102340431100002DEST_PATH_IMAGE001
Figure 2013102340431100002DEST_PATH_IMAGE001

Claims (10)

1. the Android privacy of user based on label is revealed the black box detection method, the steps include:
1) adds in the described privacy of user data to Android user terminal establishment privacy of user data and with class label;
2) be no less than an application program to be detected and trigger described application program to be detected in the installation of Android user terminal;
3) detect the class label that carries in the outside packet that sends of described application program in the data outlet;
4) judge the private data classification according to the class label that carries in the described packet.
2. the Android privacy of user based on label as claimed in claim 1 is revealed the black box detection method, it is characterized in that, described network egress is one or more in Internet or bluetooth or the short message.
3. the Android privacy of user based on label as claimed in claim 1 is revealed the black box detection method, it is characterized in that, described privacy of user data based user be set as: one or more combinations in contacts list, the application list, content of short message, SD Cavan notebook data, log information, GPS geographical location information, OS Type, the IMEI device number.
4. the Android privacy of user based on label as claimed in claim 1 is revealed the black box detection method, it is characterized in that, described class label is set one or more coded strings according to the privacy of user data type.
5. the Android privacy of user based on label as claimed in claim 1 is revealed the black box detection method, it is characterized in that, described application program to be detected is installed by manual or automated manner:
Described manual installation by the testing staff in one of Android terminal manual installation or a collection of application program to be measured and the good application program to be measured of opening installation one by one;
Described Auto-mounting installs by the existing robotization of Android system and/or the instrument of test is connected to the Android user terminal, one of Auto-mounting or a collection of application program to be measured, and the stochastic model user behavior triggers application function automatically.
6. the Android privacy of user based on label as claimed in claim 1 is revealed the black box detection method, it is characterized in that, described Android user terminal is the adjustable intelligent terminal: one or more of mobile phone, panel computer, TV.
7. the Android privacy of user based on label as claimed in claim 2 is revealed the black box detection method, it is characterized in that, detecting the packet that described application program outwards sends at the network egress of described Internet or bluetooth or short message is: the application program to be measured that Android system is installed is by calling the short message transmission interface function of web socket interface function in the Android system core library or frameworks layer, the data-message bag that sends to outside Internet, Bluetooth address and external call.
8. the Android privacy of user based on label as claimed in claim 7 is revealed the black box detection method, it is characterized in that, and is described at Internet, bluetooth, and the method whether short message network egress detection packet carries label is:
1) intercepting and capturing the web socket interface function that called by upper level applications or system component at Android system core library layer will be to outside Internet address or the packet that sends of Bluetooth address; Intercept and capture the short message data bag that the short message transmission interface function that called by upper level applications or system component will send to outside telephone number at the Android system ccf layer;
2) class label that takes out all types of user data is gathered, adopt character string comparison mode, detect packet and whether comprise some class label, if this packet character string comprises a class label in certain class user data class label set at least, then this packet has carried such user data.
9. the Android privacy of user based on label as claimed in claim 7 is revealed the black box detection method, it is characterized in that, if packet carries such user data, then record testing result and comprise: according in packet content, entrained class label, class label under classification and Packet Generation time, send the application name of packet.
10. the Android privacy of user based on label is revealed the black box detection system, comprising:
Be used for the Android user terminal is created the privacy of user data and class label added to the device of described privacy of user data;
Be used at the Android user terminal device that is no less than an application program to be detected and triggers described application program to be detected being installed;
Device for the class label that carries at the outside packet that sends of the described application program of data outlet detection;
The class label that is used for carrying according to described packet is judged the private data classification, record result's device;
And type label database and testing result database.
CN201310234043.1A 2013-06-13 2013-06-13 Based on privacy disclosure of Android user black box detection method and the system of label Expired - Fee Related CN103309808B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310234043.1A CN103309808B (en) 2013-06-13 2013-06-13 Based on privacy disclosure of Android user black box detection method and the system of label
PCT/CN2014/077139 WO2014198171A1 (en) 2013-06-13 2014-05-09 Label based black box testing method and system for android user privacy leaks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310234043.1A CN103309808B (en) 2013-06-13 2013-06-13 Based on privacy disclosure of Android user black box detection method and the system of label

Publications (2)

Publication Number Publication Date
CN103309808A true CN103309808A (en) 2013-09-18
CN103309808B CN103309808B (en) 2016-06-15

Family

ID=49135055

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310234043.1A Expired - Fee Related CN103309808B (en) 2013-06-13 2013-06-13 Based on privacy disclosure of Android user black box detection method and the system of label

Country Status (2)

Country Link
CN (1) CN103309808B (en)
WO (1) WO2014198171A1 (en)

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014198171A1 (en) * 2013-06-13 2014-12-18 华为技术有限公司 Label based black box testing method and system for android user privacy leaks
CN104579831A (en) * 2014-12-26 2015-04-29 北京网秦天下科技有限公司 Data transmission processing method and device
WO2015067170A1 (en) * 2013-11-06 2015-05-14 中国银联股份有限公司 Method and system for analyzing android application program
CN105069374A (en) * 2015-08-06 2015-11-18 上海斐讯数据通信技术有限公司 Private data intercepting protection method and system
CN105335593A (en) * 2014-06-27 2016-02-17 阿里巴巴集团控股有限公司 Method and device for detecting significance of variables in black box model
CN105354118A (en) * 2015-10-27 2016-02-24 广东欧珀移动通信有限公司 Method, apparatus and system for automatically testing intelligent terminal
CN105721477A (en) * 2016-02-25 2016-06-29 上海斐讯数据通信技术有限公司 IPTABLES-based privacy leak control method and system for mobile terminal
CN105827644A (en) * 2016-05-17 2016-08-03 努比亚技术有限公司 Method and terminal for processing cipher information
CN103984900B (en) * 2014-05-19 2017-03-01 南京赛宁信息技术有限公司 Android application leak detection method and system
CN106778255A (en) * 2016-11-24 2017-05-31 工业和信息化部电信研究院 Credible performing environment isolation detection method and device based on internal memory traversal
CN106803028A (en) * 2017-01-18 2017-06-06 西安电子科技大学 A kind of method for preventing Android mobile phone short message verification code to be stolen
US9721094B2 (en) 2015-05-20 2017-08-01 International Business Machines Corporation Determining privacy leaks
CN107038372A (en) * 2016-11-14 2017-08-11 平安科技(深圳)有限公司 Leaking data interface detection method and device
CN110737887A (en) * 2019-10-22 2020-01-31 厦门美图之家科技有限公司 Malicious code detection method and device, electronic equipment and storage medium
CN111382424A (en) * 2018-12-27 2020-07-07 全球能源互联网研究院有限公司 Mobile application sensitive behavior detection method and system based on controlled environment
CN111818492A (en) * 2020-05-20 2020-10-23 上海橙群微电子有限公司 Bluetooth beacon and data transmission method and readable storage medium thereof
CN111967047A (en) * 2020-08-18 2020-11-20 中国银行股份有限公司 Personal information protection method, device and system based on big data matching
CN112182581A (en) * 2020-09-24 2021-01-05 百度在线网络技术(北京)有限公司 Application testing method and device, application testing equipment and storage medium
CN112417506A (en) * 2020-11-26 2021-02-26 北京指掌易科技有限公司 A privacy data monitoring method, device, electronic device and storage medium
CN112487415A (en) * 2020-12-09 2021-03-12 华控清交信息科技(北京)有限公司 Method and device for detecting safety of computing task
CN113535539A (en) * 2020-04-22 2021-10-22 网易(杭州)网络有限公司 Debugging method, device, device and storage medium in game editing

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101610396A (en) * 2008-06-16 2009-12-23 北京智安邦科技有限公司 Intellective video monitoring device module and system and method for supervising thereof with secret protection
WO2011001304A1 (en) * 2009-06-30 2011-01-06 Nokia Corporation A method and an apparatus for tracing software
CN102413221A (en) * 2011-11-24 2012-04-11 中兴通讯股份有限公司 Method for protecting privacy information and mobile terminal
CN102810143A (en) * 2012-04-28 2012-12-05 天津大学 System and method for security detection of mobile phone applications based on Android platform

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103327183B (en) * 2013-06-13 2015-05-20 中国科学院信息工程研究所 Black box protecting method and system for private data of Android user based on tag
CN103309808B (en) * 2013-06-13 2016-06-15 华为技术有限公司 Based on privacy disclosure of Android user black box detection method and the system of label
CN103729595B (en) * 2014-01-02 2016-08-17 东南大学 A kind of Android application program private data leakage off-line checking method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101610396A (en) * 2008-06-16 2009-12-23 北京智安邦科技有限公司 Intellective video monitoring device module and system and method for supervising thereof with secret protection
WO2011001304A1 (en) * 2009-06-30 2011-01-06 Nokia Corporation A method and an apparatus for tracing software
CN102413221A (en) * 2011-11-24 2012-04-11 中兴通讯股份有限公司 Method for protecting privacy information and mobile terminal
CN102810143A (en) * 2012-04-28 2012-12-05 天津大学 System and method for security detection of mobile phone applications based on Android platform

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014198171A1 (en) * 2013-06-13 2014-12-18 华为技术有限公司 Label based black box testing method and system for android user privacy leaks
WO2015067170A1 (en) * 2013-11-06 2015-05-14 中国银联股份有限公司 Method and system for analyzing android application program
CN103984900B (en) * 2014-05-19 2017-03-01 南京赛宁信息技术有限公司 Android application leak detection method and system
CN105335593A (en) * 2014-06-27 2016-02-17 阿里巴巴集团控股有限公司 Method and device for detecting significance of variables in black box model
CN104579831A (en) * 2014-12-26 2015-04-29 北京网秦天下科技有限公司 Data transmission processing method and device
US9721094B2 (en) 2015-05-20 2017-08-01 International Business Machines Corporation Determining privacy leaks
CN105069374A (en) * 2015-08-06 2015-11-18 上海斐讯数据通信技术有限公司 Private data intercepting protection method and system
CN105069374B (en) * 2015-08-06 2018-02-13 上海斐讯数据通信技术有限公司 A kind of private data intercepts guard method and system
CN105354118B (en) * 2015-10-27 2019-09-13 Oppo广东移动通信有限公司 Automatic testing method, device and system for intelligent terminal
CN105354118A (en) * 2015-10-27 2016-02-24 广东欧珀移动通信有限公司 Method, apparatus and system for automatically testing intelligent terminal
CN105721477A (en) * 2016-02-25 2016-06-29 上海斐讯数据通信技术有限公司 IPTABLES-based privacy leak control method and system for mobile terminal
CN105721477B (en) * 2016-02-25 2019-11-01 上海斐讯数据通信技术有限公司 The method and system of the control privacy compromise based on IPTABLES of mobile terminal
CN105827644A (en) * 2016-05-17 2016-08-03 努比亚技术有限公司 Method and terminal for processing cipher information
WO2018086293A1 (en) * 2016-11-14 2018-05-17 平安科技(深圳)有限公司 Method and apparatus for detecting data leakage interface, device, and storage medium
CN107038372A (en) * 2016-11-14 2017-08-11 平安科技(深圳)有限公司 Leaking data interface detection method and device
CN106778255A (en) * 2016-11-24 2017-05-31 工业和信息化部电信研究院 Credible performing environment isolation detection method and device based on internal memory traversal
CN106803028B (en) * 2017-01-18 2019-08-30 西安电子科技大学 A method to prevent Android phone text message verification code from being stolen
CN106803028A (en) * 2017-01-18 2017-06-06 西安电子科技大学 A kind of method for preventing Android mobile phone short message verification code to be stolen
CN111382424A (en) * 2018-12-27 2020-07-07 全球能源互联网研究院有限公司 Mobile application sensitive behavior detection method and system based on controlled environment
CN110737887A (en) * 2019-10-22 2020-01-31 厦门美图之家科技有限公司 Malicious code detection method and device, electronic equipment and storage medium
CN113535539B (en) * 2020-04-22 2023-07-25 网易(杭州)网络有限公司 Method, device, equipment and storage medium for debugging in game editing
CN113535539A (en) * 2020-04-22 2021-10-22 网易(杭州)网络有限公司 Debugging method, device, device and storage medium in game editing
CN111818492A (en) * 2020-05-20 2020-10-23 上海橙群微电子有限公司 Bluetooth beacon and data transmission method and readable storage medium thereof
CN111818492B (en) * 2020-05-20 2024-05-24 上海橙群微电子有限公司 Bluetooth beacon, data transmission method thereof, and readable storage medium
CN111967047A (en) * 2020-08-18 2020-11-20 中国银行股份有限公司 Personal information protection method, device and system based on big data matching
CN112182581A (en) * 2020-09-24 2021-01-05 百度在线网络技术(北京)有限公司 Application testing method and device, application testing equipment and storage medium
CN112182581B (en) * 2020-09-24 2023-10-13 百度在线网络技术(北京)有限公司 Application testing method, device, application testing equipment and storage medium
CN112417506A (en) * 2020-11-26 2021-02-26 北京指掌易科技有限公司 A privacy data monitoring method, device, electronic device and storage medium
CN112487415A (en) * 2020-12-09 2021-03-12 华控清交信息科技(北京)有限公司 Method and device for detecting safety of computing task
CN112487415B (en) * 2020-12-09 2023-10-03 华控清交信息科技(北京)有限公司 Method and device for detecting security of computing task

Also Published As

Publication number Publication date
CN103309808B (en) 2016-06-15
WO2014198171A1 (en) 2014-12-18

Similar Documents

Publication Publication Date Title
CN103309808B (en) Based on privacy disclosure of Android user black box detection method and the system of label
Damshenas et al. M0droid: An android behavioral-based malware detection model
CN103327183B (en) Black box protecting method and system for private data of Android user based on tag
CN104281808B (en) A general Android malicious behavior detection method
CN105956474B (en) Android platform software unusual checking system
CN103729595B (en) A kind of Android application program private data leakage off-line checking method
CN106845236A (en) A kind of application program various dimensions privacy leakage detection method and system for iOS platforms
Canfora et al. Acquiring and analyzing app metrics for effective mobile malware detection
CN103927485A (en) Android application program risk assessment method based on dynamic monitoring
US20130117855A1 (en) Apparatus for automatically inspecting security of applications and method thereof
CN109992968A (en) A dynamic detection method of Android malicious behavior based on binary dynamic instrumentation
CN104200155A (en) Monitoring device and method for protecting user privacy based on iPhone operating system (iOS)
CN106611122A (en) Virtual execution-based unknown malicious program offline detection system
CN104766011A (en) Sandbox detection alarming method and system based on main engine characteristic
CN112035354B (en) Positioning method, device and equipment of risk codes and storage medium
CN103746992B (en) Based on reverse intruding detection system and method thereof
Zhao et al. Attack tree based android malware detection with hybrid analysis
CN108595952A (en) A kind of detection method and system of electric power mobile application software loophole
CN107766728A (en) Mobile application security managing device, method and mobile operation safety protection system
WO2017071148A1 (en) Cloud computing platform-based intelligent defense system
CN104504337A (en) Method for detecting malicious application disclosing Android data
CN106570399A (en) Method for detecting privacy leakage across app components
CN108229158A (en) A kind of guard method of the user privacy information stored in Android
CN103699835B (en) A kind of access control method towards android system resource
CN108681671A (en) A kind of Android mobile attacks source tracing method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 518129 Bantian HUAWEI headquarters office building, Longgang District, Guangdong, Shenzhen

Applicant after: Huawei Technologies Co., Ltd.

Applicant after: Institute of Information Engineering, Gas

Address before: 100093 Beijing city Haidian District minzhuang Road No. 89

Applicant before: Institute of Information Engineering, Gas

Applicant before: Huawei Technologies Co., Ltd.

COR Change of bibliographic data
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160615

Termination date: 20170613

CF01 Termination of patent right due to non-payment of annual fee