Inter-Module Authentication for Securing Application Execution Integrity Within A Computing Device

作者: Mihai Christodorescu , Vinay Sridhara , Rajarshi Gupta

DOI:

关键词:

摘要: Systems and methods for recognizing reacting to malicious or performance-degrading behaviors in a mobile device include observing an observer module within privileged-normal portion of secure operating environment identify suspicious behavior. The may generate concise behavior vector based on the observations, provide analyzer unprivileged-secure environment. be analyzed determine whether is benign, suspicious, malicious, performance-degrading. If found operations adjusted, such as perform deeper observations. user and/or client alerted secure, tamper-proof manner.

参考文章(234)
Vijayalakshmi R. Raveendran, Fang Shi, Method and apparatus for motion vector processing ,(2005)
Asaf Shabtai, Robert Moskovitch, Clint Feher, Shlomi Dolev, Yuval Elovici, Detecting unknown malicious code by applying classification techniques on OpCode patterns Security Informatics. ,vol. 1, pp. 1- 22 ,(2012) , 10.1186/2190-8532-1-1
Weiming Hu, Wei Hu, S. Maybank, AdaBoost-Based Algorithm for Network Intrusion Detection systems man and cybernetics. ,vol. 38, pp. 577- 583 ,(2008) , 10.1109/TSMCB.2007.914695
Thomas E. Potok, Ali R. Hurson, Yu Jiao, Evens Jean, Boosting-Based Distributed and Adaptive Security-Monitoring through Agent Collaboration web intelligence. pp. 516- 520 ,(2007) , 10.5555/1339264.1339633
Xin Ren, Anthony Dennis, Mauricio Pati Caldeira de Andrada, Method and system for conserving network resources when sending information to mobile devices ,(2012)
Igor Sedukhin, Girish M. Venkataramanappa, Daniel Eshner, Amol S. Kulkarni, Sumit Mohanty, Sundeep Sahi, Leo S. Vannelli, Progressively implementing declarative models in distributed systems ,(2007)
Patrick O'Neill, Patrick C. Lilley, Bindu Rama Rao, Network for updating firmware and / or software in wireless communication devices ,(2009)
Fatemeh Azmandian, Malak Alshawabkeh, Javed Aslam, Jennifer Dy, David Kaeli, Aviram Cohen, Micha Moffie, VMM-based intrusion detection system ,(2009)