Monitoring for fraudulent or harmful behavior in applications being installed on user devices

作者: Timothy Strazzere , Matthew John Joseph LaMantia , Daniel Lee Evans , Emil Barker Ong , Brian James Buck

DOI:

关键词: SoftwareComputer securitySecurity assessmentAction (philosophy)World Wide WebEngineering

摘要: Software applications to be installed on user devices are monitored. Authenticity of the is evaluated using a plurality inputs provide result. The may include trust factors. factors used generate security evaluation. In response result, an action performed such as providing notification developer fraudulent version application or assessment for application.

参考文章(530)
Ismo Bergroth, Pasi Lahti, Simo Huopio, Software virus protection ,(2001)
Stanley Chow, Christophe Gustave, Jeff Smith, Verifying authenticity of webpages ,(2007)
Richard Carl Gossweiler, James Brooks Miller, Obscuring an accelerometer signal ,(2012)
Amit Dang, Sudeep Das, Jayasankar Divakarla, Praneet Khare, Alok Shukla, System and method for whitelisting applications in a mobile network environment ,(2012)
Christopher Y. Choi, Neil I. Readshaw, Intelligent Risk Level Grouping for Resource Access Recertification ,(2013)
Richard Drews Dean, Amr Awadallah, System and method for transmission of DNS beacons ,(2006)
Steve Rehfuss, Geoff Hulten, Andrew Newman, Ron Franczyk, Christopher A. Meek, John Scarrow, Application reputation service ,(2008)