CN105677426A - Tracking device and method for data flow in Java code - Google Patents

Tracking device and method for data flow in Java code Download PDF

Info

Publication number
CN105677426A
CN105677426A CN201610017833.8A CN201610017833A CN105677426A CN 105677426 A CN105677426 A CN 105677426A CN 201610017833 A CN201610017833 A CN 201610017833A CN 105677426 A CN105677426 A CN 105677426A
Authority
CN
China
Prior art keywords
bytecode
code
java
tracked
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610017833.8A
Other languages
Chinese (zh)
Inventor
金果
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201610017833.8A priority Critical patent/CN105677426A/en
Publication of CN105677426A publication Critical patent/CN105677426A/en
Priority to PCT/CN2016/103890 priority patent/WO2017121172A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44589Program code verification, e.g. Java bytecode verification, proof-carrying code
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44521Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading

Abstract

The invention discloses a tracking device and method for a data flow in a Java code. The device comprises a determination module, an instruction insertion module and a tracking module, wherein the determination module is used for determining a byte code to be tracked when the Java execution environment loads the JAVA byte code, the instruction insertion module is used for inserting a data identifying and spreading instruction into the byte code, the data identifying and spreading instruction is used for identifying the byte code to be tracked and tracking the identified byte code, and the tracking module is used for identifying and tracking the byte code to be tracked according to the data identifying and spreading instruction. The device and method can track the data flow at little expense.

Description

The tracking apparatus and method of data stream in a kind of Java code
Technical field
The present invention relates to computer network field, particularly relate to the tracking apparatus and method of data stream in a kind of Java code.
Background technology
The Internet era that current information technology having been enter into intelligent movable, intelligent mobile terminal is increasingly becoming user carries out the primary terminal form of disparate networks activity due to its portability, low cost and other advantages. Compare traditional mobile terminal, intelligent mobile terminal has the processor of higher performance, higher mobile network data transmittability and open third party's mobile terminal operating system, therefore a large number of services application can be carried out by intelligent mobile terminal, process more individual privacy data, such as call and short message, geographical position, social network account, account No., personal identification number, photograph video etc. Meanwhile, these individual privacy data have also attracted the attention of numerous illegal assailant, cause that Malware growth rate is surprising. Therefore, how by the access data of user are tracked ensureing the safety of private data, it is lots of manufacturers' problems in the urgent need to address.
Data stream tracking technique is a kind of safe practice being widely used at information security field. Rudimentary machine state (CPU depositor, physical memory, disk block etc.) is carried out labelling by the stain labelling adopting byte level, intercept simultaneously and analyze system command stream, analyzing instruction stream to the impact of stain labelling thus updating and safeguarding stain labelling. Following the tracks of required fine granularity analysis ability to obtain data stream, stain follows the tracks of system to be needed to adopt simulator, for instance quick simulator (QuickEMUlator, QEMU) operational objective application program. This tracking system is all modify in intermediate command level when realizing, for an x86 instruction, originally have only to carry out a stain and update operation, realize based on intermediate command, the repeatedly tainting that will produce correspondence updates operation, and wherein most operation is all the tracking renewal that QEMU built-in variable is carried out, it is useless operation, causes that performance cost is relatively larger.
Summary of the invention
The technical problem that present invention mainly solves is to provide the tracking apparatus and method of data stream in a kind of Java code, it is possible to reduce the performance cost that data stream is followed the tracks of.
For solving above-mentioned technical problem, the technical scheme that the present invention adopts is: providing the tracking device of data stream in a kind of Java code, this device includes determining module, performs environment when loading JAVA bytecode for JAVA, it is determined that bytecode to be tracked;Module is inserted in instruction, propagates instruction for inserting Data Identification in described bytecode, and described Data Identification propagates instruction for described bytecode to be tracked is identified, and the described bytecode identified is tracked; Tracking module, is identified for propagating instruction according to described Data Identification described bytecode to be tracked and follows the tracks of.
For solving above-mentioned technical problem, the technical scheme that the present invention adopts is: providing the tracking of data stream in a kind of Java code, the method includes: JAVA performs environment when loading JAVA bytecode, it is determined that bytecode to be tracked; Inserting Data Identification in described bytecode and propagate instruction, described Data Identification propagates instruction for described bytecode to be tracked being identified and the described bytecode identified being tracked; Propagate instruction according to described Data Identification described bytecode to be tracked is identified and is followed the tracks of.
It is different from prior art, the tracking device of data stream in the Java code of the present invention, perform environment when loading JAVA bytecode for JAVA, it is determined that bytecode to be tracked; Inserting Data Identification in described bytecode and propagate instruction, described Data Identification propagates instruction for described bytecode to be tracked being identified and the described bytecode identified being tracked; Propagate instruction according to described Data Identification described bytecode to be tracked is identified and is followed the tracks of; It is thus possible to realize the tracking of data stream with less expense.
Accompanying drawing explanation
Fig. 1 is the structural representation of first embodiment following the tracks of device of data stream in Java code of the present invention;
Fig. 2 is the structural representation of second embodiment following the tracks of device of data stream in Java code of the present invention;
Fig. 3 is the schematic flow sheet of the first embodiment of the tracking of data stream in Java code of the present invention.
Detailed description of the invention
Make to describe in more detail further to technical scheme below in conjunction with detailed description of the invention. Obviously, described embodiment is only a part of embodiment of the present invention, rather than whole embodiments. Based on the embodiment in the present invention, the every other embodiment that those of ordinary skill in the art obtain under the premise not making creative work, all should belong to the scope of protection of the invention.
Consulting Fig. 1, Fig. 1 is the structural representation of first embodiment following the tracks of device of data stream in Java code provided by the invention.
In this Java code, the tracking device 100 of data stream comprises determining that module 110, identifies module 120, tracking module 130.
Wherein it is determined that module 110, perform environment when loading JAVA bytecode for JAVA, it is determined that bytecode to be tracked.
Concrete, based on Android system intelligent terminal run JAVA application program time, JAVA in terminal performs environment, concrete, such as dalvik virtual machine becomes bytecode firstly the need of by JAVA program translation, this bytecode is intermediate code, then bytecode is loaded successively, now determine the bytecode existed for realizing unauthorized behavior, such as, it does not have during mandate, user name and password are done buffer memory, upload user associated person information, the picture etc. deleted on local storage operates, and these unauthorized behaviors broadly fall into risky operation, need be monitored and analyze.
Module 120 is inserted in instruction, propagates instruction for inserting Data Identification in described bytecode, and described Data Identification propagates instruction for described bytecode to be tracked being identified and the described bytecode identified being tracked.
Concrete, JAVA performs environment and adds inlet identity control routine and transmission controe code in bytecode, in order to bytecode to be tracked described in bidding documents, then follows the tracks of the described bytecode identified.
For different business and different operation behaviors, different mark control routines and transmission controe code will be added.
Tracking module 130, is identified for propagating instruction according to described Data Identification described bytecode to be tracked and follows the tracks of.
Concrete, according to mark control routine, bytecode to be tracked is identified, records the operation of its correspondence; According to transmission controe code, the bytecode identified is tracked.
Optionally, the bytecode for following the tracks of, it is possible to operation corresponding for bytecode is showed user, in order to warning or prompting user.
The present invention have modified JAVA virtual machine perform environment realize source code, when JAVA code being made an explanation execution, insert for identifying and the relevant control codes of trace byte code, namely the tracking of data stream is realized from JAVA aspect, avoid the system command stream from machine bottom and do stain labelling and renewal, thus avoiding the tracking to a large amount of intermediate commands, decreasing tracking expense, improve tracking efficiency.
It is different from prior art, the tracking device of data stream in the Java code of the present invention, perform environment when loading JAVA bytecode for JAVA, it is determined that bytecode to be tracked; Inserting Data Identification in described bytecode and propagate instruction, described Data Identification propagates instruction for described bytecode to be tracked being identified and the described bytecode identified being tracked; Propagate instruction according to described Data Identification described bytecode to be tracked is identified and is followed the tracks of; It is thus possible to realize the tracking of data stream with less expense.
Consulting Fig. 2, Fig. 2 is the structural representation of second embodiment following the tracks of device of data stream in Java code provided by the invention.
In this Java code, the tracking device 200 of data stream comprises determining that module 210, and module 220, tracking module 230 are inserted in instruction.
Wherein it is determined that module 210 includes unauthorized bytecode determines unit 211, perform environment when loading JAVA bytecode for JAVA, it is determined that for realizing the bytecode of unauthorized behavior.
Concrete, based on the intelligent terminal of Android system when running JAVA application program, the JAVA in terminal performs environment, concrete, such as dalvik virtual machine becomes bytecode firstly the need of by JAVA program translation, and this bytecode is intermediate code, then loads bytecode successively. Unauthorized bytecode determines that unit 211 is when JAVA performs environment loading bytecode, find to realize the bytecode of unauthorized behavior, bytecode namely to be tracked, such as, user name and password are just done buffer memory by with no authorized, upload user associated person information, the picture etc. deleted on local storage operates, and these unauthorized behaviors broadly fall into risky operation, need be monitored and analyze.
Module 220 is inserted in instruction, inserts unit 221 including first code and second code inserts unit 222.
Wherein, first code inserts unit 221, and for inserting mark control routine in described bytecode, described mark control routine is for identifying described bytecode to be tracked, concrete, for recording the operation that described bytecode to be tracked is corresponding.
Such as, table 1 below gives some control routine examples for identification byte code, and wherein, first row is the false code of mark control routine, and secondary series is the operation that this code performs, and the 3rd row are that the implication to this code describes.
Table 1 identifies control routine list
Such as, by control routine " move-op-Ea ", it is possible to bytecode corresponding for abnormal operation is passed to parameter a.
Such as, by control routine " binary-opabc ", it be 1 low level is the value of 0 that parameter c is set to a high position, or a high position be 0 low level is the value of 1, it is possible to a high position for the data used in abnormal operation or low level are passed to parameter a.
Wherein, second code inserts unit 222, and for inserting transmission controe code in described bytecode, described transmission controe code is for following the tracks of the described bytecode identified.
Such as, table 2 below gives some transmission controe code examples for trace byte code, and wherein, first row is the false code of transmission controe code, and secondary series is the operation that this code performs, and the 3rd row are that the implication to this code describes.
Table 2 transmission controe code listing
Transmission controe code The operation that transmission controe code performs The implication of transmission controe code
const-op a C A=C, C are constant Remove a with labelling
move-op a b A=b The labelling of b is copied to a
move-op-R a A=R, R are function return value The labelling of return value is copied to a
return-op a R=a, R are function return value The labelling of a is copied to return value
throw-op a E=a, E are current abnormal The labelling of a is copied to return value
Such as, by control routine " const-opaC ", the sensitive data that variable a is originally entrained being eliminated, the bytecode information that namely it carries is purged.
Such as, by control routine " return-opa ", the bytecode information carried by a passes to system by return value.
Tracking module 230, for bytecode to be tracked being identified according to mark control routine, and is tracked the bytecode identified according to transmission controe code.
Optionally, in this Java code, the tracking device of data stream also comprises rule-definition module 240 further, inserts rule and mark propagation rule for pre-defined mark; Instruction is inserted module 220 and is also included mark rule reading unit 223, is used for reading predefined mark and inserts rule, in order to first code is inserted unit 221 and inserted rule according to described predefined mark, inserts mark control routine in described bytecode; Instruction is inserted module 220 and is also included following the tracks of rule reading unit 224, is used for reading predefined mark propagation rule, in order to second code inserts unit 222 according to described predefined mark propagation rule, inserts transmission controe code in described bytecode.
Concrete, for different business and different operation behaviors, different mark control routines and transmission controe code will be added. Needed before this programme according to traffic performance, it is such as game service or instant messaging, and is likely to the operation behavior followed the tracks of, for instance be cache user name and password or delete picture, definition identification record rule and mark propagate logic, in order to insert different control routines.
Optionally, in this Java code, the tracking device of data stream also comprises display module 250 further, for showing the operation that the described bytecode identified is corresponding.
Concrete, it is possible to provide information by the mode of text, show the operation that the described bytecode identified is corresponding, namely there is the operation of potential safety hazard, in order to prompting or warning user.
The present invention have modified JAVA virtual machine perform environment realize source code, when JAVA code being made an explanation execution, insert for identifying and the relevant control codes of trace byte code, namely the tracking of data stream is realized from JAVA aspect, avoid the system command stream from machine bottom and do stain labelling and renewal, thus avoiding the tracking to a large amount of intermediate commands, decreasing tracking expense, improve tracking efficiency.
It is different from prior art, the tracking device of data stream in the Java code of the present invention, perform environment when loading JAVA bytecode for JAVA, it is determined that bytecode to be tracked; Inserting Data Identification in described bytecode and propagate instruction, described Data Identification propagates instruction for described bytecode to be tracked being identified and the described bytecode identified being tracked; Propagate instruction according to described Data Identification described bytecode to be tracked is identified and is followed the tracks of; It is thus possible to realize the tracking of data stream with less expense.
Consult the schematic flow sheet that Fig. 3, Fig. 3 are tracking first embodiments of data stream in Java code provided by the invention.
The step of the method includes:
S301:JAVA performs environment when loading JAVA bytecode, it is determined that bytecode to be tracked.
Wherein, based on Android system intelligent terminal run JAVA application program time, JAVA in terminal performs environment, concrete, such as dalvik virtual machine becomes bytecode firstly the need of by JAVA program translation, this bytecode is intermediate code, then loads bytecode successively, now determines the bytecode for realizing unauthorized behavior, bytecode namely to be tracked. Such as, it does not have authorizing and user name and password just do buffer memory, upload user associated person information, the picture etc. deleted on local storage operates, and these unauthorized behaviors broadly fall into risky operation, need be monitored and analyze.
S302: inserting Data Identification in described bytecode and propagate instruction, described Data Identification propagates instruction for described bytecode to be tracked being identified and the described bytecode identified being tracked.
This step is implemented as: inserting mark control routine in described bytecode, described record control routine is for identifying described bytecode to be tracked, namely corresponding for recording described bytecode to be tracked operation; And in described bytecode, inserting transmission controe code, described transmission controe code is for following the tracks of the described bytecode identified.
Such as, table 3 below gives some control routine examples for identification byte code, and wherein, first row is the false code of mark control routine, and secondary series is the operation that this code performs, and the 3rd row are that the implication to this code describes.
Table 3 identifies control routine list
Such as, by control routine " move-op-Ea ", it is possible to bytecode corresponding for abnormal operation is passed to parameter a.
Such as, by control routine " binary-opabc ", it be 1 low level is the value of 0 that parameter c is set to a high position, or a high position be 0 low level is the value of 1, it is possible to a high position for the data used in abnormal operation or low level are passed to parameter a.
Such as, table 4 below gives some transmission controe code examples for trace byte code, and wherein, first row is the false code of transmission controe code, and secondary series is the operation that this code performs, and the 3rd row are that the implication to this code describes.
Table 4 transmission controe code listing
Transmission controe code The operation that transmission controe code performs The implication of transmission controe code
const-op a C A=C, C are constant Remove a with labelling
move-op a b A=b The labelling of b is copied to a
move-op-R a A=R, R are function return value The labelling of return value is copied to a
return-op a R=a, R are function return value The labelling of a is copied to return value
throw-op a E=a, E are current abnormal The labelling of a is copied to return value
Such as, by control routine " const-opaC ", the sensitive data that variable a is originally entrained being eliminated, the bytecode information that namely it carries is purged.
Such as, by control routine " return-opa ", the bytecode information carried by a passes to system by return value.
S303: propagate instruction according to described Data Identification and described bytecode to be tracked is identified and follows the tracks of.
Concrete, according to mark control routine, bytecode to be tracked is identified, and according to transmission controe code, the bytecode identified is tracked.
Further, before step S301, pre-defined mark inserts record rule and mark propagation rule; The described Data Identification that inserts in described bytecode propagates instruction, and described Data Identification is propagated instruction and comprised mark control routine and transmission controe code particularly as follows: insert rule according to mark, inserts mark control routine in described bytecode; According to described mark propagation rule, described bytecode inserts transmission controe code.
Concrete, for different business and different operation behaviors, different record control routines and transmission controe code will be added. Needed before this programme according to traffic performance, it is such as game service or instant messaging, and is likely to the operation behavior followed the tracks of, for instance be cache user name and password or delete picture, definition identification record rule and mark propagate logic, in order to insert different control routines.
Optionally, the operation showing that the described bytecode identified is corresponding can also be comprised after step S303 further. Concrete, it is possible to provide information by the mode of text, show the operation that the described bytecode identified is corresponding, namely there is the operation of potential safety hazard, in order to prompting or warning user.
The present invention have modified JAVA virtual machine perform environment realize source code, when JAVA code being made an explanation execution, insert for identifying and the relevant control codes of trace byte code, namely the tracking of data stream is realized from JAVA aspect, avoid the system command stream from machine bottom and do stain labelling and renewal, thus avoiding the tracking to a large amount of intermediate commands, decreasing tracking expense, improve tracking efficiency.
It is different from prior art, the tracking of data stream in the Java code of the present invention, JAVA performs environment when loading JAVA bytecode, it is determined that bytecode to be tracked; Inserting Data Identification in described bytecode and propagate instruction, described Data Identification propagates instruction for described bytecode to be tracked being identified and the described bytecode identified being tracked; Propagate instruction according to described Data Identification described bytecode to be tracked is identified and is followed the tracks of; It is thus possible to realize the tracking of data stream with less expense.
The foregoing is only embodiments of the present invention; not thereby the scope of the claims of the present invention is limited; every equivalent structure utilizing description of the present invention and accompanying drawing content to make or equivalence flow process conversion; or directly or indirectly it is used in other relevant technical fields, all in like manner include in the scope of patent protection of the present invention.

Claims (10)

1. the tracking device of data stream in a Java code, it is characterised in that including:
Determine module, perform environment when loading JAVA bytecode for JAVA, it is determined that bytecode to be tracked;
Module is inserted in instruction, propagates instruction for inserting Data Identification in described bytecode, and described Data Identification propagates instruction for described bytecode to be tracked being identified and the described bytecode identified being tracked;
Tracking module, is identified for propagating instruction according to described Data Identification described bytecode to be tracked and follows the tracks of.
2. the tracking device of data stream in Java code according to claim 1, it is characterized in that: described determine that module includes unauthorized bytecode and determines unit, environment is performed when loading JAVA bytecode, it is determined that for realizing the bytecode of unauthorized behavior for described JAVA.
3. the tracking device of data stream in Java code according to claim 1 and 2, it is characterised in that described instruction is inserted module and included:
First code inserts unit, and for inserting mark control routine in described bytecode, described mark control routine is for identifying described bytecode to be tracked;
Second code inserts unit, and for inserting transmission controe code in described bytecode, described transmission controe code is for following the tracks of the described bytecode identified.
4. the tracking device of data stream in Java code according to claim 3, its feature is being in that, also includes rule-definition module, inserts rule and mark propagation rule for pre-defined mark;
Described instruction is inserted module and is also included mark rule reading unit, is used for reading predefined mark and inserts rule, in order to described first code is inserted unit and inserted rule according to described predefined mark, inserts mark control routine in described bytecode;
Described instruction is inserted module and is also included following the tracks of rule reading unit, is used for reading predefined mark propagation rule, in order to described second code inserts unit according to described predefined mark propagation rule, inserts transmission controe code in described bytecode.
5. the tracking device of data stream in Java code according to claim 1 and 2, its feature is being in that, also includes display module, for showing the operation that the described bytecode identified is corresponding.
6. the tracking of data stream in a Java code, it is characterised in that including:
JAVA performs environment when loading JAVA bytecode, it is determined that bytecode to be tracked;
Inserting Data Identification in described bytecode and propagate instruction, described Data Identification propagates instruction for described bytecode to be tracked being identified and the described bytecode identified being tracked;
Propagate instruction according to described Data Identification described bytecode to be tracked is identified and is followed the tracks of.
7. the tracking of data stream in Java code according to claim 6, it is characterised in that described determine bytecode to be tracked particularly as follows: determine the bytecode for realizing unauthorized behavior.
8. the tracking of data stream in the Java code according to claim 6 or 7, it is characterized in that, described Data Identification is propagated instruction and is comprised mark control routine and transmission controe code, described mark control routine is for identifying described bytecode to be tracked, and described transmission controe code is for following the tracks of the described bytecode identified.
9. the tracking of data stream in Java code according to claim 8, it is characterised in that pre-defined mark inserts rule and mark propagation rule; The described Data Identification that inserts in described bytecode propagates instruction, and described Data Identification is propagated instruction and comprised mark control routine and transmission controe code particularly as follows: insert rule according to mark, inserts mark control routine in described bytecode; According to described mark propagation rule, described bytecode inserts transmission controe code.
10. the tracking of data stream in the Java code according to claim 6 or 7, it is characterised in that also include showing the operation that the described bytecode identified is corresponding.
CN201610017833.8A 2016-01-12 2016-01-12 Tracking device and method for data flow in Java code Pending CN105677426A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610017833.8A CN105677426A (en) 2016-01-12 2016-01-12 Tracking device and method for data flow in Java code
PCT/CN2016/103890 WO2017121172A1 (en) 2016-01-12 2016-10-29 Tracking device and method for data flow in java code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610017833.8A CN105677426A (en) 2016-01-12 2016-01-12 Tracking device and method for data flow in Java code

Publications (1)

Publication Number Publication Date
CN105677426A true CN105677426A (en) 2016-06-15

Family

ID=56300089

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610017833.8A Pending CN105677426A (en) 2016-01-12 2016-01-12 Tracking device and method for data flow in Java code

Country Status (2)

Country Link
CN (1) CN105677426A (en)
WO (1) WO2017121172A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017121172A1 (en) * 2016-01-12 2017-07-20 上海斐讯数据通信技术有限公司 Tracking device and method for data flow in java code

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110704874B (en) * 2019-09-27 2023-06-20 西北大学 Privacy disclosure protection method based on data tracing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1410150B1 (en) * 2001-07-17 2009-06-17 Liquid Machines, Inc. Protecting software applications against software piracy
CN102034045A (en) * 2010-12-15 2011-04-27 上海交通大学 Software bug detection system with low computer system resource expense
CN104778419A (en) * 2015-04-15 2015-07-15 华中科技大学 User privacy data protection method based on dynamic data flow tracking under cloud environment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104765687B (en) * 2015-04-10 2017-07-21 江西师范大学 The J2EE bug detection methods analyzed based on Object tracking and stain
CN105677426A (en) * 2016-01-12 2016-06-15 上海斐讯数据通信技术有限公司 Tracking device and method for data flow in Java code

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1410150B1 (en) * 2001-07-17 2009-06-17 Liquid Machines, Inc. Protecting software applications against software piracy
CN102034045A (en) * 2010-12-15 2011-04-27 上海交通大学 Software bug detection system with low computer system resource expense
CN104778419A (en) * 2015-04-15 2015-07-15 华中科技大学 User privacy data protection method based on dynamic data flow tracking under cloud environment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017121172A1 (en) * 2016-01-12 2017-07-20 上海斐讯数据通信技术有限公司 Tracking device and method for data flow in java code

Also Published As

Publication number Publication date
WO2017121172A1 (en) 2017-07-20

Similar Documents

Publication Publication Date Title
US10915659B2 (en) Privacy detection of a mobile application program
US10185924B1 (en) Security risk response impact analysis
CN111064745B (en) Self-adaptive back-climbing method and system based on abnormal behavior detection
CN103309808B (en) Based on privacy disclosure of Android user black box detection method and the system of label
JP6609047B2 (en) Method and device for application information risk management
CN103632080B (en) A kind of mobile data applications method for security protection based on USBKey
US11086983B2 (en) System and method for authenticating safe software
US10986103B2 (en) Signal tokens indicative of malware
CN109446817A (en) A kind of detection of big data and auditing system
CN101959193A (en) Information safety detection method and a mobile terminal
CN108763951B (en) Data protection method and device
CN105453102A (en) Systems and methods for identifying private keys that have been compromised
CN104992117A (en) Abnormal behavior detection method and behavior model establishment method of HTML5 mobile application program
KR102180098B1 (en) A malware detecting system performing monitoring of malware and controlling a device of user
CN114065204A (en) File-free Trojan horse searching and killing method and device
CN110071924A (en) Big data analysis method and system based on terminal
CN110458401A (en) Information processing unit, method and storage medium based on block chain
CN111259382A (en) Malicious behavior identification method, device and system and storage medium
CN106325993A (en) Freezing method of application program and terminal
CN105677426A (en) Tracking device and method for data flow in Java code
CN108090364B (en) Method and system for positioning data leakage source
CN103001937B (en) The system and method for isolated island formula Ethernet defence mobile memory medium virus
CN106529281A (en) Executable file processing method and device
CN112651039A (en) Electric power data differentiation desensitization method and device fusing service scenes
CN111460459A (en) Risk information processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160615