In-line filtering of insecure or unwanted mobile device software components or communications

作者: Michael Price , Anthony John Bettini , Domingo J. Guerra , Kevin Watkins

DOI:

关键词:

摘要: Techniques for in-line filtering of insecure or unwanted mobile components communications (e.g., behaviors associated with applications devices (“apps”), updates apps, to/from operating system components/updates devices, etc.) are disclosed. In some embodiments, apps includes intercepting a request downloading an application to device; and modifying response the device. notification that cannot be downloaded due risk policy violation.

参考文章(92)
N. Tawbi, M. Debbabi, J. Desharnais, Y. Lavoie, J. Bergeron, M. M. Erhioui, Static Detection of Malicious Code in Executable Programs ,(2000)
Cristina Cifuentes, Interprocedural data flow decompilation Journal of Programming Languages. ,vol. 4, pp. 77- 99 ,(1996)
Brian Lewis, David Ung, Cristina Cifuentes, Walkabout: a retargetable dynamic binary translation framework Sun Microsystems, Inc.. ,(2002)
Theodora Heather Titonis, Nelson Roberto Manohar-Alers, Christopher John Wysopal, Automated behavioral and static analysis using an instrumented sandbox and machine learning classification for mobile security ,(2012)
Yuujiâc O Mitsubishi Denki K.K. Takahashi, Computer program debugging system ,(1986)
Toshiya Okamoto, Kazuhiko Yoda, Shinichi Yoshida, Apparatus for debugging a data flow program ,(1989)