期刊文献+

APP违法违规收集个人信息评估系统

Evaluation System of APP Illegal Collection of Personal Information
下载PDF
导出
摘要 为提高人工检测违法违规收集个人信息的效率,基于正则表达式语义分析和机器学习技术,开发了APP(Application)违法违规收集个人信息评估系统。对线上APP进行违法违规检测,生成检测算法和规则,重点解决了隐私政策半自动化获取、APP检测引擎、定制ROM(Read Only Memory)的动态沙箱等技术难点。利用开发的原型系统对各大应用平台上架APP进行常态化技术检测,检测结果表明,该系统大幅提升了违法违规收集个人信息APP综合治理研判效率。 To improve the efficiency of manual detection of illegal and irregular collection of personal information,an APP(Application)personal information evaluation system for illegal and irregular collection is developed based on techniques such as regular expression semantic analysis and machine learning.We conducted illegal and irregular detection on online apps,generated detection algorithms and rules,and focused on solving technical difficulties such as semi automated access to privacy policies,app detection engines,and dynamic sandboxes for custom ROM(Read Only Memory).The developed prototype system is used to conduct regular technical testing on the apps listed on major application platforms.The testing results show that the system significantly improves the efficiency of comprehensive governance and judgment of illegal and irregular collection of personal information apps,and effectively supports the relevant work of higher-level management departments.
作者 李凯 李雨 王乐枭 张晓晴 LI Kai;LI Yu;WANG Lexiao;ZHANG Xiaoqing(Network Secunty Department,Liaoning Branch of National Computer Network Emergency Technology Handling and Coordination Center,Shenyang 110036,China)
出处 《吉林大学学报(信息科学版)》 CAS 2024年第3期537-543,共7页 Journal of Jilin University(Information Science Edition)
基金 国家计算机网络应急技术处理协调中心青年基金资助项目(2021Q56)。
关键词 移动互联网应用程序 个人信息保护 语义分析 机器学习 application(APP) personal information protection semantic analysis machine learning
  • 相关文献

参考文献2

二级参考文献21

  • 1NETHERCOTS N. Dynamic binary analsis and instrumentation[D].Cambridge:University of Cambridage,2004.
  • 2BRUENING D. Efficient,transparent,and comprehensive runtime code manipulation[D].Cambridge:Massachusetts Institute of Technology,2004.
  • 3HAZELWOOD K. Dynamic binary modification tools,techniques,and applications[M].London:Morgan & Claypool Publishers,2011.
  • 4KUMAR N,CHILDERS B R,SOFFA M L. Low overhead program monitoring and profiling[J].ACM SIGSOFT Software Engineering Notes,2005,(01):28-34.
  • 5ZHAO Qin,CUTCUTACHE L,WONG W F. PiPA:pipelined profling and analysis on multi-core systems[A].New York:acm Press,2008.185-194.
  • 6UPTON D,HZAELWOOD K,COHN R. Improving instrumentation speed via buffering[A].New York:acm Press,2009.52-61.
  • 7WALLACE S,HAZELOOD K. SuperPin:parallelizing dynamic instrumentation for real-time performance[A].Washington,DC:IEEE Computer Society,2007.209-220.
  • 8MOSELEY T,SHYE A,REDDI V J. Shadow profling:hiding instrumentation costs with parallelism[A].Washington,DC:IEEE Computer Society,2007.198-208.
  • 9UH G R,COHN R. Analyzing dynamic binary instrumentation overhead[A].New York:acm Press,2007.56-64.
  • 10HILL J,SUTHERLAND H,STODINGER P. OASIS:a serviceoriented architecture for dynamic instrumentation of enterprise distributed real-time and embedded systems[A].[S.l.]:IEEE Press,2010.10-17.

共引文献1720

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部