Analyzing security of applications

作者: Ethan Zane Evans , David Allen Markley , Eric Jason Brandwine

DOI:

关键词:

摘要: In various embodiments, static, dynamic, and behavioral analyses may be performed on an application. A set of code fragments employed by the application determined. device resources An fingerprint is generated for potentially malicious component and/or behaviors are identified. The encodes identifiers resources.

参考文章(15)
Theodora Heather Titonis, Nelson Roberto Manohar-Alers, Christopher John Wysopal, Automated behavioral and static analysis using an instrumented sandbox and machine learning classification for mobile security ,(2012)
Xinwen Zhang, Guanhua Yan, Songqing Chen, Lei Liu, Probable Computing Attack Detector ,(2011)
Madhusudan Raman, Jeffrey Getchius, Renu Chipalkatti, Predictive scoring management system for application behavior ,(2011)
Dmitri Alperovitch, Matthew Brinkley, Sven Krasser, System and method for crowdsourcing of mobile application reputations ,(2013)
Jun-Bin Shi, Shu-Fen Yang, Pang-Chieh Wang, Jun-Yu Chen, Computing environment security method and electronic computing system ,(2013)
Matthew L Boney, Justin R Bertman, Jeffery Herman, Bryan M Liston, Steve Thomas, System and method for locating malware ,(2005)
Michael Price, Anthony John Bettini, Domingo J. Guerra, Kevin Watkins, In-line filtering of insecure or unwanted mobile device software components or communications ,(2013)
Bruce Wootton, Kevin Patrick Mahaffey, Timothy Micheal Wyatt, System and method for a scanning api ,(2011)
Daniel Wyschogrod, Jonathan Aron Rubin, Steven W. Jilcott, John O. Everett, System and method for computer inspection of information objects for shared malware components ,(2012)