BR112016023521A2 - método e sistema para inferir estados de aplicação por executar operações de análise comportamental em um dispositivo móvel - Google Patents
método e sistema para inferir estados de aplicação por executar operações de análise comportamental em um dispositivo móvelInfo
- Publication number
- BR112016023521A2 BR112016023521A2 BR112016023521A BR112016023521A BR112016023521A2 BR 112016023521 A2 BR112016023521 A2 BR 112016023521A2 BR 112016023521 A BR112016023521 A BR 112016023521A BR 112016023521 A BR112016023521 A BR 112016023521A BR 112016023521 A2 BR112016023521 A2 BR 112016023521A2
- Authority
- BR
- Brazil
- Prior art keywords
- mobile device
- activity
- software application
- analysis operations
- shadow
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F1/00—Details not covered by groups G06F3/00 - G06F13/00 and G06F21/00
- G06F1/26—Power supply means, e.g. regulation thereof
- G06F1/32—Means for saving power
- G06F1/3203—Power management, i.e. event-based initiation of a power-saving mode
- G06F1/3206—Monitoring of events, devices or parameters that trigger a change in power modality
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/48—Program initiating; Program switching, e.g. by interrupt
- G06F9/4806—Task transfer initiation or dispatching
- G06F9/4843—Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
- G06F9/4881—Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues
- G06F9/4893—Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues taking into account power or heat criteria
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Virology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Debugging And Monitoring (AREA)
- Stored Programmes (AREA)
- Telephone Function (AREA)
- Power Sources (AREA)
Abstract
métodos, sistemas e dispositivos computam e usam os estados de execução efetivos de aplicativos de software para implementar esquemas de economia de energia e executar operações de monitoramento e análise comportamental. um dispositivo móvel pode ser configurado para monitorar uma atividade de um aplicativo de software, gerar um valor de característica de sombra que identifica estado de execução efetivo do aplicativo de software durante aquela atividade, gerar um vetor de comportamento que associa a atividade monitorada com o valor de característica de sombra, e determinar se a atividade é maliciosa ou benigna com base no vetor de comportamento gerado, valor de característica de sombra e/ou estados de execução de sistema de operação. o processador de dispositivo móvel pode ser também configurado para determinar de modo inteligente se o estado de execução de um aplicativo de software é relevante para determinar se quaisquer dos comportamentos de dispositivo móvel monitorado são maliciosos ou suspeitos, e monitorar somente os estados de execução dos aplicativos de software para os quais tais determinações sejam relevantes.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/247,400 US9684787B2 (en) | 2014-04-08 | 2014-04-08 | Method and system for inferring application states by performing behavioral analysis operations in a mobile device |
PCT/US2015/024254 WO2015157108A1 (en) | 2014-04-08 | 2015-04-03 | Method and system for inferring application states by performing behavioral analysis operations in a mobile device |
Publications (1)
Publication Number | Publication Date |
---|---|
BR112016023521A2 true BR112016023521A2 (pt) | 2017-08-15 |
Family
ID=53039597
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR112016023521A BR112016023521A2 (pt) | 2014-04-08 | 2015-04-03 | método e sistema para inferir estados de aplicação por executar operações de análise comportamental em um dispositivo móvel |
Country Status (7)
Country | Link |
---|---|
US (1) | US9684787B2 (pt) |
EP (1) | EP3129856A1 (pt) |
JP (1) | JP6345271B2 (pt) |
KR (1) | KR101789962B1 (pt) |
CN (1) | CN106133642B (pt) |
BR (1) | BR112016023521A2 (pt) |
WO (1) | WO2015157108A1 (pt) |
Families Citing this family (68)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10089582B2 (en) * | 2013-01-02 | 2018-10-02 | Qualcomm Incorporated | Using normalized confidence values for classifying mobile device behaviors |
JP6290255B2 (ja) * | 2013-12-03 | 2018-03-07 | 株式会社東芝 | 機器状態推定装置、機器消費電力推定装置、およびプログラム |
US9876673B2 (en) * | 2014-06-25 | 2018-01-23 | Vmware, Inc. | Self-learning automated remediation of changes that cause performance degradation of applications |
US9485263B2 (en) * | 2014-07-16 | 2016-11-01 | Microsoft Technology Licensing, Llc | Volatility-based classifier for security solutions |
US9619648B2 (en) | 2014-07-16 | 2017-04-11 | Microsoft Technology Licensing, Llc | Behavior change detection system for services |
US10210213B2 (en) * | 2014-07-30 | 2019-02-19 | International Business Machines Corporation | Providing context in activity streams |
US10102374B1 (en) | 2014-08-11 | 2018-10-16 | Sentinel Labs Israel Ltd. | Method of remediating a program and system thereof by undoing operations |
US9710648B2 (en) | 2014-08-11 | 2017-07-18 | Sentinel Labs Israel Ltd. | Method of malware detection and system thereof |
US11507663B2 (en) | 2014-08-11 | 2022-11-22 | Sentinel Labs Israel Ltd. | Method of remediating operations performed by a program and system thereof |
US10110622B2 (en) | 2015-02-13 | 2018-10-23 | Microsoft Technology Licensing, Llc | Security scanner |
US10846705B2 (en) | 2015-02-20 | 2020-11-24 | Qualcomm Incorporated | Automating customer service an internet of everything environment |
US9979606B2 (en) | 2015-03-04 | 2018-05-22 | Qualcomm Incorporated | Behavioral analysis to automate direct and indirect local monitoring of internet of things device health |
US10659479B2 (en) * | 2015-03-27 | 2020-05-19 | Mcafee, Llc | Determination of sensor usage |
CN106295328B (zh) | 2015-05-20 | 2019-06-18 | 阿里巴巴集团控股有限公司 | 文件检测方法、装置及系统 |
US10671504B2 (en) * | 2015-07-28 | 2020-06-02 | Lenovo (Singapore) Pte. Ltd. | System performance monitoring and optimization |
US10678320B2 (en) * | 2015-07-28 | 2020-06-09 | Lenovo (Singapore) Pte. Ltd. | Device power monitoring and optimization |
JP2017046084A (ja) * | 2015-08-25 | 2017-03-02 | コニカミノルタ株式会社 | 画像処理装置、制御タスクの割り当て方法及び割り当てプログラム |
US10365700B2 (en) * | 2015-11-27 | 2019-07-30 | Samsung Electronics Co., Ltd. | System and method of managing context-aware resource hotplug |
KR20170094905A (ko) * | 2016-02-12 | 2017-08-22 | 한국전자통신연구원 | 전자 장치 및 상기 전자 장치의 전력 절감 방법 |
KR102408649B1 (ko) * | 2016-02-19 | 2022-06-15 | 삼성전자주식회사 | 환경 설정 방법 및 장치 |
US10528734B2 (en) * | 2016-03-25 | 2020-01-07 | The Mitre Corporation | System and method for vetting mobile phone software applications |
EP3226133A1 (en) * | 2016-03-31 | 2017-10-04 | Huawei Technologies Co., Ltd. | Task scheduling and resource provisioning system and method |
US10452840B2 (en) * | 2016-07-14 | 2019-10-22 | Qualcomm Incorporated | Devices and methods for classifying an execution session |
CN107645482B (zh) * | 2016-07-22 | 2020-08-07 | 创新先进技术有限公司 | 一种针对业务操作的风险控制方法及装置 |
US10621333B2 (en) * | 2016-08-08 | 2020-04-14 | International Business Machines Corporation | Install-time security analysis of mobile applications |
US20180060569A1 (en) * | 2016-08-26 | 2018-03-01 | Qualcomm Incorporated | Detection and Prevention of Malicious Shell Exploits |
US10534925B2 (en) * | 2016-10-05 | 2020-01-14 | Microsoft Technology Licensing, Llc | Detection of compromised devices via user states |
US10289189B2 (en) | 2016-10-31 | 2019-05-14 | Microsoft Technology Licensing, Llc | Usage pattern based supervisory control of power management |
US10169576B2 (en) | 2016-11-15 | 2019-01-01 | International Business Machines Corporation | Malware collusion detection |
US9983976B1 (en) * | 2016-11-29 | 2018-05-29 | Toyota Jidosha Kabushiki Kaisha | Falsification of software program with datastore(s) |
US9842041B1 (en) | 2016-11-29 | 2017-12-12 | Toyota Jidosha Kabushiki Kaisha | Approximation of datastore storing indexed data entries |
US11695800B2 (en) | 2016-12-19 | 2023-07-04 | SentinelOne, Inc. | Deceiving attackers accessing network data |
US11616812B2 (en) | 2016-12-19 | 2023-03-28 | Attivo Networks Inc. | Deceiving attackers accessing active directory data |
EP3352110B1 (en) | 2017-01-23 | 2020-04-01 | Cyphort Inc. | System and method for detecting and classifying malware |
US10645107B2 (en) * | 2017-01-23 | 2020-05-05 | Cyphort Inc. | System and method for detecting and classifying malware |
US20180255074A1 (en) * | 2017-03-01 | 2018-09-06 | Symantec Corporation | Managing data encrypting applications |
US10462171B2 (en) | 2017-08-08 | 2019-10-29 | Sentinel Labs Israel Ltd. | Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking |
US10417413B2 (en) * | 2017-10-10 | 2019-09-17 | The Florida International University Board Of Trustees | Context-aware intrusion detection method for smart devices with sensors |
CN111527478B (zh) * | 2017-10-13 | 2022-08-09 | 华为技术有限公司 | 云设备协同实时用户体验和性能异常检测的系统和方法 |
CN107844338B (zh) * | 2017-10-31 | 2019-09-13 | Oppo广东移动通信有限公司 | 应用程序管控方法、装置、介质及电子设备 |
KR102036847B1 (ko) * | 2017-12-18 | 2019-10-25 | (주)케이사인 | 런타임 특징 프로파일링 방법 |
CN109472134B (zh) * | 2017-12-25 | 2022-04-19 | 北京安天网络安全技术有限公司 | 一种基于api调用序列提取控制端的方法及系统 |
US11470115B2 (en) | 2018-02-09 | 2022-10-11 | Attivo Networks, Inc. | Implementing decoys in a network environment |
JP6795529B2 (ja) * | 2018-02-15 | 2020-12-02 | Kddi株式会社 | 通信分析方法およびシステム |
US11037675B1 (en) * | 2018-03-05 | 2021-06-15 | Securas Technologies, LLC | Screening-based availability of communications device features |
CN108733427B (zh) * | 2018-03-13 | 2020-04-21 | Oppo广东移动通信有限公司 | 输入组件的配置方法、装置、终端及存储介质 |
EP3779690A4 (en) | 2018-04-20 | 2021-05-12 | Guangdong Oppo Mobile Telecommunications Corp., Ltd. | PROCESSOR CORE PLANNING METHOD AND DEVICE, TERMINAL DEVICE AND STORAGE MEDIUM |
CN108769254B (zh) * | 2018-06-25 | 2019-09-20 | 星环信息科技(上海)有限公司 | 基于抢占式调度的资源共享使用方法、系统及设备 |
US20210165690A1 (en) * | 2018-08-14 | 2021-06-03 | Telefonaktiebolaget Lm Ericsson (Publ) | System and Method for Efficient Execution and Monitoring of Machine-to-Machine Device Management Tasks |
US11163554B2 (en) * | 2018-10-09 | 2021-11-02 | Here Global B.V. | Method and apparatus for identifying abandoned applications and services |
CN109215616B (zh) * | 2018-10-11 | 2021-02-05 | 合肥联宝信息技术有限公司 | 一种控制方法及电子设备 |
WO2020107415A1 (zh) * | 2018-11-30 | 2020-06-04 | 华为技术有限公司 | 一种功耗预测方法及装置 |
US10776243B1 (en) | 2019-03-19 | 2020-09-15 | Bank Of America Corporation | Prediction tool |
CN110166317B (zh) * | 2019-05-14 | 2022-06-28 | 晶晨半导体(上海)股份有限公司 | 一种影响Wi-Fi吞吐量的测试方法 |
WO2020236981A1 (en) | 2019-05-20 | 2020-11-26 | Sentinel Labs Israel Ltd. | Systems and methods for executable code detection, automatic feature extraction and position independent code detection |
CN112149122A (zh) * | 2019-06-28 | 2020-12-29 | 卡巴斯基实验室股份制公司 | 对计算设备上的应用进行分类的系统和方法 |
RU2747514C2 (ru) * | 2019-06-28 | 2021-05-06 | Акционерное общество "Лаборатория Касперского" | Система и способ категоризации приложения на вычислительном устройстве |
US11461673B2 (en) * | 2019-10-07 | 2022-10-04 | Servicenow, Inc. | Shared machine learning model for application discovery |
KR102346890B1 (ko) * | 2019-12-18 | 2022-01-03 | 고려대학교 산학협력단 | 기계학습 알고리즘 기반 최적의 cpu 주파수 예측 장치 |
US20210201191A1 (en) * | 2019-12-27 | 2021-07-01 | Stmicroelectronics, Inc. | Method and system for generating machine learning based classifiers for reconfigurable sensor |
US11403207B2 (en) * | 2020-02-28 | 2022-08-02 | Microsoft Technology Licensing, Llc. | Detection of runtime errors using machine learning |
US11082315B1 (en) | 2020-12-14 | 2021-08-03 | Qualcomm Incorporated | Method of sub flow or activity classification |
US11579857B2 (en) | 2020-12-16 | 2023-02-14 | Sentinel Labs Israel Ltd. | Systems, methods and devices for device fingerprinting and automatic deployment of software in a computing network using a peer-to-peer approach |
KR20220131023A (ko) * | 2021-03-19 | 2022-09-27 | 삼성전자주식회사 | 멀티 프로세서를 포함하는 전자 장치 및 그 운용 방법 |
US11899782B1 (en) | 2021-07-13 | 2024-02-13 | SentinelOne, Inc. | Preserving DLL hooks |
EP4369194A1 (en) * | 2022-01-27 | 2024-05-15 | Samsung Electronics Co., Ltd. | Electronic device for executing application in background process, and operation method thereof |
TWI803222B (zh) * | 2022-03-04 | 2023-05-21 | 華碩電腦股份有限公司 | 影像錄製方法及其系統 |
TWI824453B (zh) * | 2022-03-24 | 2023-12-01 | 華碩電腦股份有限公司 | 影像剪輯方法及其系統 |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7290266B2 (en) | 2001-06-14 | 2007-10-30 | Cisco Technology, Inc. | Access control by a real-time stateful reference monitor with a state collection training mode and a lockdown mode for detecting predetermined patterns of events indicative of requests for operating system resources resulting in a decision to allow or block activity identified in a sequence of events based on a rule set defining a processing policy |
US7818800B1 (en) | 2005-08-05 | 2010-10-19 | Symantec Corporation | Method, system, and computer program product for blocking malicious program behaviors |
US8201244B2 (en) | 2006-09-19 | 2012-06-12 | Microsoft Corporation | Automated malware signature generation |
US8458695B2 (en) * | 2006-10-17 | 2013-06-04 | Manageiq, Inc. | Automatic optimization for virtual systems |
US8434151B1 (en) | 2008-01-04 | 2013-04-30 | International Business Machines Corporation | Detecting malicious software |
US8595834B2 (en) | 2008-02-04 | 2013-11-26 | Samsung Electronics Co., Ltd | Detecting unauthorized use of computing devices based on behavioral patterns |
US8010773B2 (en) | 2008-06-24 | 2011-08-30 | Microsoft Corporation | Hardware constrained software execution |
US8370931B1 (en) | 2008-09-17 | 2013-02-05 | Trend Micro Incorporated | Multi-behavior policy matching for malware detection |
US8266698B1 (en) | 2009-03-09 | 2012-09-11 | Symantec Corporation | Using machine infection characteristics for behavior-based detection of malware |
US8826424B2 (en) | 2009-03-27 | 2014-09-02 | Sophos Limited | Run-time additive disinfection of malware functions |
JP5084798B2 (ja) * | 2009-08-24 | 2012-11-28 | 日本電信電話株式会社 | アプリケーション状態認識方法、装置及びプログラム |
US8479286B2 (en) | 2009-12-15 | 2013-07-02 | Mcafee, Inc. | Systems and methods for behavioral sandboxing |
CN103370716B (zh) * | 2010-11-03 | 2016-10-19 | 维吉尼亚技术知识产权公司 | 使用电力指纹监控基于计算机系统的完整性的方法和系统 |
US9088601B2 (en) | 2010-12-01 | 2015-07-21 | Cisco Technology, Inc. | Method and apparatus for detecting malicious software through contextual convictions, generic signatures and machine learning techniques |
US9672355B2 (en) | 2011-09-16 | 2017-06-06 | Veracode, Inc. | Automated behavioral and static analysis using an instrumented sandbox and machine learning classification for mobile security |
US9832211B2 (en) * | 2012-03-19 | 2017-11-28 | Qualcomm, Incorporated | Computing device to detect malware |
US9027125B2 (en) * | 2012-05-01 | 2015-05-05 | Taasera, Inc. | Systems and methods for network flow remediation based on risk correlation |
US20130304677A1 (en) * | 2012-05-14 | 2013-11-14 | Qualcomm Incorporated | Architecture for Client-Cloud Behavior Analyzer |
US9202047B2 (en) | 2012-05-14 | 2015-12-01 | Qualcomm Incorporated | System, apparatus, and method for adaptive observation of mobile device behavior |
-
2014
- 2014-04-08 US US14/247,400 patent/US9684787B2/en active Active
-
2015
- 2015-04-03 WO PCT/US2015/024254 patent/WO2015157108A1/en active Application Filing
- 2015-04-03 JP JP2016560980A patent/JP6345271B2/ja active Active
- 2015-04-03 KR KR1020167030524A patent/KR101789962B1/ko active IP Right Grant
- 2015-04-03 CN CN201580016999.1A patent/CN106133642B/zh not_active Expired - Fee Related
- 2015-04-03 EP EP15719909.2A patent/EP3129856A1/en not_active Withdrawn
- 2015-04-03 BR BR112016023521A patent/BR112016023521A2/pt not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
WO2015157108A1 (en) | 2015-10-15 |
US9684787B2 (en) | 2017-06-20 |
EP3129856A1 (en) | 2017-02-15 |
JP2017517796A (ja) | 2017-06-29 |
JP6345271B2 (ja) | 2018-06-20 |
KR101789962B1 (ko) | 2017-10-25 |
CN106133642B (zh) | 2018-08-21 |
US20150286820A1 (en) | 2015-10-08 |
CN106133642A (zh) | 2016-11-16 |
KR20160142853A (ko) | 2016-12-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112016023521A2 (pt) | método e sistema para inferir estados de aplicação por executar operações de análise comportamental em um dispositivo móvel | |
BR112017005622A2 (pt) | detecção e remediação de anomalia de pressão de centro de dados | |
BR112019007629A2 (pt) | geração e monitoramento de eventos de equipamento de proteção contra quedas | |
BR112015002316A2 (pt) | métodos, sistemas, e meios legíveis por computador para monitoramento ativo, proteção de memória e verificação de integridade de dispositivos alvos | |
WO2016085883A3 (en) | Call stack integrity check on client/server systems | |
BR112017002876A2 (pt) | método de detecção de vírus do computador e sistema deste | |
BR112015015259A2 (pt) | método, aparelhos e dispositivo eletrônico para gerenciamento de conexão | |
BR112013004345A2 (pt) | sistema e método para evitar malware acoplado a um servidor | |
BR112017009869A2 (pt) | sistema para gerenciamento de inventário | |
BR112013001925A2 (pt) | dispositivo de segurança integrado para controle de vírus de hacker | |
BR112015027143A2 (pt) | método e dispositivo para definição de tarefa | |
EP4406591A3 (en) | Medical device operational modes | |
BR112013029061A2 (pt) | método de processamento e dispositivo em andamento de aplicativo | |
BRPI0916193A2 (pt) | Método para permitir uma localização do dispositivo de computação do usuário a ser monitorado a partir de uma localização remota, meio legível por computador e sistema para a proteção de dados privados enquanto monitorando um dispositivo eletrônico | |
WO2014118788A3 (en) | Early warning system and/or optical monitoring of livestock including poultry | |
BR112016002536A2 (pt) | peça de vestuário com dispositivo de emergência e método de emergência associado | |
BR112017002661A2 (pt) | monitor de processo industrial sem fio, sistema de monitoramento sem fio, e, método em um dispositivo de campo sem fio em um sistema de controle de processo industrial. | |
GB201100039D0 (en) | Server, user device and malware detection method thereof | |
BR112014019636A8 (pt) | Dispositivo e métodos para monitoramento de um evento com geração de respingos durante uma soldagem analisando-se eventos com geração de respingos | |
BR112015016460A2 (pt) | sistema e método com objetivos de desempenho de recursos de soldagem | |
BR112016023925A2 (pt) | sistema, método e programa de computador para lidar com a interação de robô humanoide com humano | |
BR112013030366A2 (pt) | método, aparelho e produto de programa de computador | |
BR112015018082A8 (pt) | Sistema e método implementado em computador para permitir que os desenvolvedores de aplicativos de software incorporem scripts de terceiros nos aplicativos de software dos mesmos | |
BR112013010398A2 (pt) | método e aparelho para reforçar uma política em um dispositivo de cliente | |
BR112016023999A2 (pt) | monitoramento da atividade de um robô |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B08F | Application fees: application dismissed [chapter 8.6 patent gazette] |
Free format text: REFERENTE A 5A ANUIDADE. |
|
B08K | Patent lapsed as no evidence of payment of the annual fee has been furnished to inpi [chapter 8.11 patent gazette] |
Free format text: REFERENTE AO DESPACHO 8.6 PUBLICADO NA RPI 2560 DE 28/01/2020. |
|
B350 | Update of information on the portal [chapter 15.35 patent gazette] |