Sensitive Data Leak Detection Based on Boundary Detection

Sensitive data has a great influence on our daily lives. Once the leakage of sensitive data occurred, the timely detection and response is of great importance. This article puts forward the concept of boundary detection based on the black box testing. And with the idea of boundary detection, a cross-platform sensitive data leakage detection system is built.

[1]  Tadao Takaoka,et al.  On improving the average case of the Boyer-Moore string matching algorithm , 1988 .

[2]  Sin Yeung Lee,et al.  Network Forensics on Packet Fingerprints , 2006, SEC.

[3]  Leonidas J. Guibas,et al.  A New Proof of the Linearity of the Boyer-Moore String Searching Algorithm , 1980, SIAM J. Comput..

[4]  Daniel Sunday,et al.  A very fast substring search algorithm , 1990, CACM.

[5]  Ricardo A. Baeza-Yates,et al.  String Searching Algorithms Revisited , 1989, WADS.

[6]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[7]  Martin A. Green,et al.  High-efficiency silicon solar cells , 1984, IEEE Transactions on Electron Devices.

[8]  Hector Garcia-Molina,et al.  A Model for Data Leakage Detection , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[9]  Zheng Tao Dynamic privacy protection model based on Android permissions , 2012 .

[10]  Boris Beizer,et al.  Black Box Testing: Techniques for Functional Testing of Software and Systems , 1996, IEEE Software.

[11]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[12]  Ron Y. Pinter,et al.  Efficient String Matching with Don’t-Care Patterns , 1985 .

[13]  Hector Garcia-Molina,et al.  Data Leakage Detection , 2011, IEEE Transactions on Knowledge and Data Engineering.

[14]  D. Maric,et al.  Interstitial H and {H,B}, {H,C}and {H,Si} Pairs in Si and Ge , 1992 .

[15]  Bo Qu,et al.  Test Case Prioritization for Black Box Testing , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).