2012 IEEE Symposium on Computers and Communications (ISCC) 2012
DOI: 10.1109/iscc.2012.6249324
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing application private information leaks with privacy Petri Net

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2012
2012
2013
2013

Publication Types

Select...
2
2

Relationship

3
1

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…In this paper, we updated PPN from our previous work to overcome the new challenge of the multi‐process malware. We build PPN modules of different privacy theft subprocedure for analyzing the detail of privacy theft behavior.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this paper, we updated PPN from our previous work to overcome the new challenge of the multi‐process malware. We build PPN modules of different privacy theft subprocedure for analyzing the detail of privacy theft behavior.…”
Section: Resultsmentioning
confidence: 99%
“…For modeling the aforementioned behavior of multi‐process privacy theft malware, this paper is based on an abstract model called Privacy Petri Net (PPN) we presented before in to characterize the whole privacy theft procedure by a more high‐level description and make our analysis result more applicable to various malware and more understandable to users. PPN is a kind of high‐level Petri Net that focuses on privacy theft and has three main features: Firstly, PPN provides formal mathematical definitions of syntax and semantics for privacy attributes and functions calculation.…”
Section: Introductionmentioning
confidence: 99%
“…Privacy Petri Net (PPN) is a high-level Petri net dedicated to privacy leak behavior analysis [10], which has three main features. Firstly, PPN has formal mathematical definitions of syntax and semantics, which provide a precise specification on the target software behavior, so as to essentially define various behavior properties.…”
Section: Modelmentioning
confidence: 99%
“…To overcome these two problems, we propose, for the first time, a set of desired quantitative metrics based on an abstract model called Privacy Petri Net (PPN) presented in [10], which characterizes the entire privacy leak procedure with more highlevel description. Specifically, we propose and define four quantitative metrics, i.e., possibility, severity, crypticity, and manipulability, to characterize different aspects of privacy leak behavior and make the analysis more understandable.…”
Section: Introductionmentioning
confidence: 99%
“…But there is still a lack of models which focus on privacy leak problem. This paper is based on an abstract model called Privacy Petri Net (PPN) we presented in [20] to characterize the whole leaking procedure of PLS by more high-level description and let our analysis result be more applicable to different software and be more meaningful to users. PPN is a kind of high-level Petri net which focuses on PLS analyzing and has three main features: Firstly, PPN has formal mathematical definition of syntax and semantics for privacy attribution and functions calculation.…”
Section: Introductionmentioning
confidence: 99%