Techniques for detecting a security vulnerability

作者: Shireen Rivera , Peter Ashley

DOI:

关键词: Internet privacyReputationBusinessComputer security

摘要: Techniques for detecting security vulnerabilities are disclosed. In one particular embodiment, the techniques may be realized as a method including assigning reputation to an application, distributing client, receiving monitored system behavior from client related executing determining whether change of application based on behavior, changed further and generate rule received client.

参考文章(18)
Anthony Kobrinetz, Eric Ridvan Uner, Joshua Scott Matthews, Benjamin James Leslie, Martin H. Singer, Enhanced Security SCADA Systems and Methods ,(2012)
Yevgeny Korsunsky, Moisey Akerman, Network intrusion detection apparatus ,(2010)
Aaron Goldfeder, Karen E. Corby, John M. Hawkins, Method and system for ensuring that computer programs are trustworthy ,(2004)
Mahruma Khatoon Siddiqua, Atm Shafiqul Khalid, Mustafizur Rahman, Safe and secure program execution framework ,(2008)
Amit Dang, Sudeep Das, Jayasankar Divakarla, Praneet Khare, Alok Shukla, System and method for whitelisting applications in a mobile network environment ,(2012)
Carey S. Nachenberg, IP-based blocking of malware ,(2010)
Lev Timourovich Popov, Evan Stratford, Christopher Alexander Stein, Differentiating between good and bad content in a user-provided content system ,(2010)
Dmitri Alperovitch, Matthew Brinkley, Sven Krasser, System and method for crowdsourcing of mobile application reputations ,(2013)