JP6228966B2 - マルウェアを検出するコンピューティングデバイス - Google Patents
マルウェアを検出するコンピューティングデバイス Download PDFInfo
- Publication number
- JP6228966B2 JP6228966B2 JP2015501765A JP2015501765A JP6228966B2 JP 6228966 B2 JP6228966 B2 JP 6228966B2 JP 2015501765 A JP2015501765 A JP 2015501765A JP 2015501765 A JP2015501765 A JP 2015501765A JP 6228966 B2 JP6228966 B2 JP 6228966B2
- Authority
- JP
- Japan
- Prior art keywords
- behavior
- application
- query
- behavior vector
- computing device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Debugging And Monitoring (AREA)
Description
102 コンピューティングデバイス
104 プロセッサ
106 メモリ
108 クエリロガー
110 インターフェース
120 アクションのログ
122 挙動分析エンジン
130 挙動ベクトル
132 分類器
140 良性
150 マルウェア
160 ニュースアプリケーション
162 ゲームアプリケーション
164 ゲームアプリケーション
166 ゲームアプリケーション
Claims (10)
- ロガーと、挙動分析エンジンと、機械学習分類器とを備えるモバイルコンピューティングデバイスで動作するアプリケーションを分析する方法であって、
前記ロガーによって、複数のアプリケーションの各々についてのアクションをアクションのログに記録するステップと、
前記挙動分析エンジンによって、前記アクションのログに記録された前記アクションに基づいて、前記複数のアプリケーションの各アプリケーションについての挙動ベクトルを生成するステップであって、各アプリケーションについての挙動ベクトルは、各アプリケーションの挙動を特徴づける複数の数値を含み、前記挙動ベクトルの前記複数の数値は、サーバから得られた挙動モデルにより生成され、前記挙動モデルは、一群のモバイルコンピューティングデバイスから挙動レポートを収集する前記サーバによって生成される、ステップと、
前記機械学習分類器によって、各アプリケーションについての各挙動ベクトルによって特徴づけられる挙動が良性であるかどうかを前記挙動ベクトルの前記複数の数値に基づいて決定するステップと
を含む、方法。 - アプリケーションに関連付けられた前記挙動ベクトルによって特徴付けられた前記挙動が良性ではないと判定したことに応じて、前記アプリケーションを使用から削除または制限するステップ
をさらに含む、請求項1に記載の方法。 - 各アプリケーションについての前記挙動ベクトルを生成するステップが、
前記アクションのログの一組のクエリに基づいて各挙動ベクトルを生成するステップ
を含む、請求項1に記載の方法。 - 前記アクションのログの前記一組のクエリに基づいて前記挙動ベクトルを生成するステップが、
存在クエリ、順序クエリ、およびカテゴリクエリのうちの少なくとも1つに基づいて各挙動ベクトルを生成するステップであって、存在クエリは前記アクションのログ中のアクションセットの存在を参照しており、順序クエリは一連のアクションの発生回数を参照しており、カテゴリクエリは前記アプリケーションがあるカテゴリに属するかどうかを参照している、ステップ
を含む、請求項3に記載の方法。 - 前記アクションのログの前記一組のクエリに基づいて各挙動ベクトルを生成するステップが、
実際の挙動および予想された挙動のうちの1つのクエリに基づいて少なくとも1つの挙動ベクトルを生成するステップ
をさらに含む、請求項4に記載の方法。 - 請求項1から5のいずれか一項に記載の方法をコンピューティングデバイスのプロセッサに実行させるように構成された、プロセッサ実行可能ソフトウェア命令を記憶した、非一時的コンピュータ可読記憶媒体。
- モバイルコンピューティングデバイスであって、
複数のアプリケーションの各々についてのアクションをアクションのログに記録するための手段と、
前記アクションのログに記録された前記アクションに基づいて、前記複数のアプリケーションの各アプリケーションについての挙動ベクトルを生成するための手段であって、各アプリケーションについての挙動ベクトルは、各アプリケーションの挙動を特徴づける複数の数値を含み、前記挙動ベクトルの前記複数の数値は、サーバから得られた挙動モデルにより生成され、前記挙動モデルは、一群のモバイルコンピューティングデバイスから挙動レポートを収集する前記サーバによって生成される、手段と、
各アプリケーションについての各挙動ベクトルによって特徴づけられる挙動が良性であるかどうかを前記挙動ベクトルの前記複数の数値に基づいて決定する手段と
を備える、モバイルコンピューティングデバイス。 - アプリケーションに関連付けられた前記挙動ベクトルによって特徴付けられた前記挙動が良性ではないと判定したことに応じて、前記アプリケーションを使用から削除または制限するための手段
をさらに備える、請求項7に記載のモバイルコンピューティングデバイス。 - 各アプリケーションについての前記挙動ベクトルを生成するための手段が、
前記アクションのログの一組のクエリに基づいて各挙動ベクトルを生成するための手段
を備える、請求項7に記載のモバイルコンピューティングデバイス。 - 前記アクションのログの前記一組のクエリに基づいて前記挙動ベクトルを生成するための手段が、
存在クエリ、数量クエリ、順序クエリ、およびカテゴリクエリのうちの少なくとも1つに基づいて各挙動ベクトルを生成するための手段であって、存在クエリは前記アクションのログ中のアクションセットの存在を参照しており、順序クエリは一連のアクションの発生回数を参照しており、カテゴリクエリは前記アプリケーションがあるカテゴリに属するかどうかを参照している、手段と、
実際の挙動および予想された挙動のうちの1つのクエリに基づいて少なくとも1つの挙動ベクトルを生成するための手段と
を備える、請求項9に記載のモバイルコンピューティングデバイス。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US13/424,251 US9832211B2 (en) | 2012-03-19 | 2012-03-19 | Computing device to detect malware |
US13/424,251 | 2012-03-19 | ||
PCT/US2013/031184 WO2013142228A1 (en) | 2012-03-19 | 2013-03-14 | Computing device to detect malware |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2015511047A JP2015511047A (ja) | 2015-04-13 |
JP2015511047A5 JP2015511047A5 (ja) | 2016-04-07 |
JP6228966B2 true JP6228966B2 (ja) | 2017-11-08 |
Family
ID=48045057
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2015501765A Active JP6228966B2 (ja) | 2012-03-19 | 2013-03-14 | マルウェアを検出するコンピューティングデバイス |
Country Status (6)
Country | Link |
---|---|
US (2) | US9832211B2 (ja) |
EP (1) | EP2828789A1 (ja) |
JP (1) | JP6228966B2 (ja) |
KR (1) | KR102057565B1 (ja) |
CN (2) | CN110781496A (ja) |
WO (1) | WO2013142228A1 (ja) |
Families Citing this family (85)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8973137B1 (en) * | 2012-02-29 | 2015-03-03 | Symantec Corporation | Systems and methods for detecting illegitimate out-of-band authentication attempts |
US9832211B2 (en) | 2012-03-19 | 2017-11-28 | Qualcomm, Incorporated | Computing device to detect malware |
US9202047B2 (en) | 2012-05-14 | 2015-12-01 | Qualcomm Incorporated | System, apparatus, and method for adaptive observation of mobile device behavior |
US9324034B2 (en) | 2012-05-14 | 2016-04-26 | Qualcomm Incorporated | On-device real-time behavior analyzer |
US20130304677A1 (en) * | 2012-05-14 | 2013-11-14 | Qualcomm Incorporated | Architecture for Client-Cloud Behavior Analyzer |
US9298494B2 (en) | 2012-05-14 | 2016-03-29 | Qualcomm Incorporated | Collaborative learning for efficient behavioral analysis in networked mobile device |
US9609456B2 (en) | 2012-05-14 | 2017-03-28 | Qualcomm Incorporated | Methods, devices, and systems for communicating behavioral analysis information |
US9690635B2 (en) * | 2012-05-14 | 2017-06-27 | Qualcomm Incorporated | Communicating behavior information in a mobile computing device |
US9407443B2 (en) | 2012-06-05 | 2016-08-02 | Lookout, Inc. | Component analysis of software applications on computing devices |
US9589129B2 (en) | 2012-06-05 | 2017-03-07 | Lookout, Inc. | Determining source of side-loaded software |
US20140006616A1 (en) * | 2012-06-29 | 2014-01-02 | Nokia Corporation | Method and apparatus for categorizing application access requests on a device |
US9319897B2 (en) | 2012-08-15 | 2016-04-19 | Qualcomm Incorporated | Secure behavior analysis over trusted execution environment |
US9330257B2 (en) | 2012-08-15 | 2016-05-03 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
US9747440B2 (en) | 2012-08-15 | 2017-08-29 | Qualcomm Incorporated | On-line behavioral analysis engine in mobile device with multiple analyzer model providers |
US9495537B2 (en) | 2012-08-15 | 2016-11-15 | Qualcomm Incorporated | Adaptive observation of behavioral features on a mobile device |
US9298916B2 (en) * | 2012-12-10 | 2016-03-29 | Lookout, Inc. | Method and apparatus for enhanced file system monitoring on mobile communications devices |
US9208215B2 (en) | 2012-12-27 | 2015-12-08 | Lookout, Inc. | User classification based on data gathered from a computing device |
US9684870B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of using boosted decision stumps and joint feature selection and culling algorithms for the efficient classification of mobile device behaviors |
US9686023B2 (en) | 2013-01-02 | 2017-06-20 | Qualcomm Incorporated | Methods and systems of dynamically generating and using device-specific and device-state-specific classifier models for the efficient classification of mobile device behaviors |
US10089582B2 (en) | 2013-01-02 | 2018-10-02 | Qualcomm Incorporated | Using normalized confidence values for classifying mobile device behaviors |
US9742559B2 (en) | 2013-01-22 | 2017-08-22 | Qualcomm Incorporated | Inter-module authentication for securing application execution integrity within a computing device |
US9330256B2 (en) * | 2013-02-01 | 2016-05-03 | Qualcomm Incorporated | Location based process-monitoring |
US9491187B2 (en) | 2013-02-15 | 2016-11-08 | Qualcomm Incorporated | APIs for obtaining device-specific behavior classifier models from the cloud |
US9519775B2 (en) | 2013-10-03 | 2016-12-13 | Qualcomm Incorporated | Pre-identifying probable malicious behavior based on configuration pathways |
US9213831B2 (en) * | 2013-10-03 | 2015-12-15 | Qualcomm Incorporated | Malware detection and prevention by monitoring and modifying a hardware pipeline |
US9444804B2 (en) * | 2013-11-25 | 2016-09-13 | Roy S. Melzer | Dynamic security question generation |
US9652362B2 (en) * | 2013-12-06 | 2017-05-16 | Qualcomm Incorporated | Methods and systems of using application-specific and application-type-specific models for the efficient classification of mobile device behaviors |
US9753796B2 (en) | 2013-12-06 | 2017-09-05 | Lookout, Inc. | Distributed monitoring, evaluation, and response for multiple devices |
CN105874463A (zh) * | 2013-12-30 | 2016-08-17 | 诺基亚技术有限公司 | 用于恶意软件检测的方法和装置 |
US9591015B1 (en) | 2014-03-28 | 2017-03-07 | Fireeye, Inc. | System and method for offloading packet processing and static analysis operations |
US9684787B2 (en) * | 2014-04-08 | 2017-06-20 | Qualcomm Incorporated | Method and system for inferring application states by performing behavioral analysis operations in a mobile device |
CN103955645B (zh) | 2014-04-28 | 2017-03-08 | 百度在线网络技术(北京)有限公司 | 恶意进程行为的检测方法、装置及系统 |
US10805340B1 (en) | 2014-06-26 | 2020-10-13 | Fireeye, Inc. | Infection vector and malware tracking with an interactive user display |
US9710752B2 (en) * | 2014-09-11 | 2017-07-18 | Qualcomm Incorporated | Methods and systems for aggregated multi-application behavioral analysis of mobile device behaviors |
US20160078362A1 (en) * | 2014-09-15 | 2016-03-17 | Qualcomm Incorporated | Methods and Systems of Dynamically Determining Feature Sets for the Efficient Classification of Mobile Device Behaviors |
CN104573515A (zh) | 2014-12-19 | 2015-04-29 | 百度在线网络技术(北京)有限公司 | 一种病毒处理方法、装置和系统 |
US9690933B1 (en) | 2014-12-22 | 2017-06-27 | Fireeye, Inc. | Framework for classifying an object as malicious with machine learning for deploying updated predictive models |
US9378364B1 (en) * | 2014-12-27 | 2016-06-28 | Intel Corporation | Technologies for managing security threats to a computing system utilizing user interactions |
US9838417B1 (en) | 2014-12-30 | 2017-12-05 | Fireeye, Inc. | Intelligent context aware user interaction for malware detection |
US9680646B2 (en) * | 2015-02-05 | 2017-06-13 | Apple Inc. | Relay service for communication between controllers and accessories |
US9875357B2 (en) * | 2015-02-06 | 2018-01-23 | Qualcomm Incorporated | Methods and systems for detecting fake user interactions with a mobile device for improved malware protection |
US20160232353A1 (en) * | 2015-02-09 | 2016-08-11 | Qualcomm Incorporated | Determining Model Protection Level On-Device based on Malware Detection in Similar Devices |
US10148693B2 (en) | 2015-03-25 | 2018-12-04 | Fireeye, Inc. | Exploit detection system |
US10659479B2 (en) * | 2015-03-27 | 2020-05-19 | Mcafee, Llc | Determination of sensor usage |
US9477837B1 (en) | 2015-03-31 | 2016-10-25 | Juniper Networks, Inc. | Configuring a sandbox environment for malware testing |
EP3289510B1 (en) | 2015-05-01 | 2020-06-17 | Lookout Inc. | Determining source of side-loaded software |
US10104107B2 (en) * | 2015-05-11 | 2018-10-16 | Qualcomm Incorporated | Methods and systems for behavior-specific actuation for real-time whitelisting |
US10021123B2 (en) * | 2015-06-29 | 2018-07-10 | Qualcomm Incorporated | Customized network traffic models to detect application anomalies |
US20170024660A1 (en) * | 2015-07-23 | 2017-01-26 | Qualcomm Incorporated | Methods and Systems for Using an Expectation-Maximization (EM) Machine Learning Framework for Behavior-Based Analysis of Device Behaviors |
US9544798B1 (en) * | 2015-07-23 | 2017-01-10 | Qualcomm Incorporated | Profiling rogue access points |
US20170046510A1 (en) * | 2015-08-14 | 2017-02-16 | Qualcomm Incorporated | Methods and Systems of Building Classifier Models in Computing Devices |
US9699205B2 (en) | 2015-08-31 | 2017-07-04 | Splunk Inc. | Network security system |
US10255434B2 (en) * | 2015-09-17 | 2019-04-09 | Qualcomm Incorporated | Detecting software attacks on processes in computing devices |
CN105223455B (zh) * | 2015-11-11 | 2018-04-10 | 无锡中感微电子股份有限公司 | 安全监测系统、方法以及便携式电子设备 |
US9838405B1 (en) * | 2015-11-20 | 2017-12-05 | Symantec Corporation | Systems and methods for determining types of malware infections on computing devices |
SE542513C2 (en) | 2015-12-15 | 2020-05-26 | Saab Ab | A method for authenticating software |
US10333949B1 (en) * | 2016-03-15 | 2019-06-25 | Symantec Corporation | Proactive protection of mobile operating system malware via blocking of infection vector |
CN105868394A (zh) * | 2016-04-19 | 2016-08-17 | 中山大学 | 一种基于web和日志信息的app分类方法及其装置 |
US20170308701A1 (en) * | 2016-04-22 | 2017-10-26 | Qualcomm Incorporated | Methods and Systems for Intelligently Detecting Malware and Attacks on Client Computing Devices and Corporate Networks |
CN107025547B (zh) * | 2016-09-19 | 2020-10-16 | 创新先进技术有限公司 | 支付通道检测方法、装置及终端 |
CN106845228A (zh) * | 2016-12-28 | 2017-06-13 | 微梦创科网络科技(中国)有限公司 | 一种检测恶意程序的方法和装置 |
EP3563555A1 (en) * | 2016-12-29 | 2019-11-06 | Avast Software S.R.O. | System and method for detecting malicious device by using a behavior analysis |
CN106803039B (zh) * | 2016-12-30 | 2019-09-17 | 北京神州绿盟信息安全科技股份有限公司 | 一种恶意文件的同源判定方法及装置 |
US10491616B2 (en) * | 2017-02-13 | 2019-11-26 | Microsoft Technology Licensing, Llc | Multi-signal analysis for compromised scope identification |
US10581887B1 (en) * | 2017-05-31 | 2020-03-03 | Ca, Inc. | Employing a relatively simple machine learning classifier to explain evidence that led to a security action decision by a relatively complex machine learning classifier |
US10218697B2 (en) | 2017-06-09 | 2019-02-26 | Lookout, Inc. | Use of device risk evaluation to manage access to services |
KR102033354B1 (ko) | 2017-11-01 | 2019-10-17 | 국민대학교산학협력단 | Cnn 학습 기반의 멀웨어 분석 장치, 이를 수행하는 cnn 학습 기반의 멀웨어 분석 방법 및 이를 저장하는 기록매체 |
US10567156B2 (en) | 2017-11-30 | 2020-02-18 | Bank Of America Corporation | Blockchain-based unexpected data detection |
KR101851351B1 (ko) * | 2017-12-07 | 2018-04-23 | (주)시큐레이어 | 악성 코드 분석을 수행하는 방법 및 클러스터링 서버 |
CN108491720B (zh) * | 2018-03-20 | 2023-07-14 | 腾讯科技(深圳)有限公司 | 一种应用识别方法、系统以及相关设备 |
US10834112B2 (en) | 2018-04-24 | 2020-11-10 | At&T Intellectual Property I, L.P. | Web page spectroscopy |
US10771485B2 (en) * | 2018-07-12 | 2020-09-08 | Bank Of America Corporation | Systems and methods for cross-channel electronic communication security with dynamic targeting |
JP7198617B2 (ja) * | 2018-09-21 | 2023-01-04 | 株式会社日立ハイテクソリューションズ | セキュリティシステム |
US10880328B2 (en) * | 2018-11-16 | 2020-12-29 | Accenture Global Solutions Limited | Malware detection |
CN109583567A (zh) * | 2018-11-29 | 2019-04-05 | 四川大学 | 一种基于CNN的Web自动扫描器指纹识别模型 |
CN109726601A (zh) * | 2018-12-29 | 2019-05-07 | 360企业安全技术(珠海)有限公司 | 违规行为的识别方法及装置、存储介质、计算机设备 |
US12001548B2 (en) * | 2019-06-25 | 2024-06-04 | Paypal, Inc. | Threat detection using machine learning query analysis |
US11616795B2 (en) * | 2019-08-23 | 2023-03-28 | Mcafee, Llc | Methods and apparatus for detecting anomalous activity of an IoT device |
JP7283552B2 (ja) * | 2019-09-27 | 2023-05-30 | 日本電気株式会社 | 情報処理装置、情報処理方法、及び、プログラム |
US11687717B2 (en) * | 2019-12-03 | 2023-06-27 | Morgan State University | System and method for monitoring and routing of computer traffic for cyber threat risk embedded in electronic documents |
JP2022007238A (ja) * | 2020-06-26 | 2022-01-13 | パナソニックIpマネジメント株式会社 | 情報処理装置、情報処理方法及びプログラム |
US11513878B2 (en) * | 2020-06-26 | 2022-11-29 | Acronis International Gmbh | Systems and methods for detecting behavioral anomalies in applications |
WO2022137403A1 (ja) * | 2020-12-23 | 2022-06-30 | 日本電気株式会社 | 情報収集制御装置、情報収集システム、情報収集制御方法、及び情報収集制御プログラム |
US11818219B2 (en) * | 2021-09-02 | 2023-11-14 | Paypal, Inc. | Session management system |
CN116414269B (zh) * | 2023-06-06 | 2023-10-20 | 荣耀终端有限公司 | 流氓应用的识别方法和电子设备 |
Family Cites Families (37)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7150045B2 (en) * | 2000-12-14 | 2006-12-12 | Widevine Technologies, Inc. | Method and apparatus for protection of electronic media |
JP4142868B2 (ja) * | 2001-12-06 | 2008-09-03 | 日本情報通信コンサルティング株式会社 | 病症データ集中収集管理システム、サーバ装置 |
US7509679B2 (en) | 2002-08-30 | 2009-03-24 | Symantec Corporation | Method, system and computer program product for security in a global computer network transaction |
US20040205419A1 (en) * | 2003-04-10 | 2004-10-14 | Trend Micro Incorporated | Multilevel virus outbreak alert based on collaborative behavior |
JP2006146600A (ja) * | 2004-11-19 | 2006-06-08 | Ntt Docomo Inc | 動作監視サーバ、端末装置及び動作監視システム |
US8161554B2 (en) * | 2005-04-26 | 2012-04-17 | Cisco Technology, Inc. | System and method for detection and mitigation of network worms |
US20070074289A1 (en) | 2005-09-28 | 2007-03-29 | Phil Maddaloni | Client side exploit tracking |
US7809670B2 (en) | 2005-12-09 | 2010-10-05 | Microsoft Corporation | Classification of malware using clustering that orders events in accordance with the time of occurance |
US8321941B2 (en) | 2006-04-06 | 2012-11-27 | Juniper Networks, Inc. | Malware modeling detection system and method for mobile platforms |
CN200962655Y (zh) | 2006-09-08 | 2007-10-17 | 上海尚茂电子技术有限公司 | 一种用于移动设备的活动图像压缩系统 |
US8201244B2 (en) * | 2006-09-19 | 2012-06-12 | Microsoft Corporation | Automated malware signature generation |
JP4232828B2 (ja) * | 2007-02-01 | 2009-03-04 | 沖電気工業株式会社 | アプリケーション分類方法、ネットワーク異常検知方法、アプリケーション分類プログラム、ネットワーク異常検知プログラム、アプリケーション分類装置、ネットワーク異常検知装置 |
US9137664B2 (en) * | 2007-05-01 | 2015-09-15 | Qualcomm Incorporated | Application logging interface for a mobile device |
US8713680B2 (en) | 2007-07-10 | 2014-04-29 | Samsung Electronics Co., Ltd. | Method and apparatus for modeling computer program behaviour for behavioural detection of malicious program |
US8448248B2 (en) * | 2007-07-23 | 2013-05-21 | Samsung Electronics Co., Ltd. | Apparatus and method for repairing computer system infected by malware |
KR20090027000A (ko) * | 2007-09-11 | 2009-03-16 | 한국전자통신연구원 | 상황 인식 시스템 환경에서 발생한 이벤트 로그에 기초하여사용자 행동 패턴을 구축하는 장치 및 방법 |
IL191744A0 (en) * | 2008-05-27 | 2009-02-11 | Yuval Elovici | Unknown malcode detection using classifiers with optimal training sets |
US8763071B2 (en) | 2008-07-24 | 2014-06-24 | Zscaler, Inc. | Systems and methods for mobile application security classification and enforcement |
KR101010302B1 (ko) * | 2008-12-24 | 2011-01-25 | 한국인터넷진흥원 | Irc 및 http 봇넷 보안 관제를 위한 관리 시스템 및 그 방법 |
US8635694B2 (en) * | 2009-01-10 | 2014-01-21 | Kaspersky Lab Zao | Systems and methods for malware classification |
US20100192222A1 (en) | 2009-01-23 | 2010-07-29 | Microsoft Corporation | Malware detection using multiple classifiers |
JP2010262609A (ja) | 2009-04-28 | 2010-11-18 | Fourteenforty Research Institute Inc | 効率的なマルウェアの動的解析手法 |
JP2010267128A (ja) | 2009-05-15 | 2010-11-25 | Ntt Docomo Inc | 解析システム、解析装置、検知方法、解析方法及びプログラム |
US8549641B2 (en) | 2009-09-03 | 2013-10-01 | Palo Alto Research Center Incorporated | Pattern-based application classification |
US8739283B1 (en) * | 2009-12-07 | 2014-05-27 | Trend Micro, Inc. | Automatic generation of malware clean pattern |
US8474040B2 (en) * | 2010-02-19 | 2013-06-25 | International Business Machines Corporation | Environmental imaging |
US20110219449A1 (en) * | 2010-03-04 | 2011-09-08 | St Neitzel Michael | Malware detection method, system and computer program product |
KR101051641B1 (ko) | 2010-03-30 | 2011-07-26 | 주식회사 안철수연구소 | 이동통신 단말 및 이를 이용한 행위기반 악성 코드 진단 방법 |
JP5478384B2 (ja) * | 2010-06-24 | 2014-04-23 | Kddi株式会社 | アプリケーション判定システムおよびプログラム |
RU2444056C1 (ru) * | 2010-11-01 | 2012-02-27 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ ускорения решения проблем за счет накопления статистической информации |
US9088601B2 (en) | 2010-12-01 | 2015-07-21 | Cisco Technology, Inc. | Method and apparatus for detecting malicious software through contextual convictions, generic signatures and machine learning techniques |
RU2454714C1 (ru) * | 2010-12-30 | 2012-06-27 | Закрытое акционерное общество "Лаборатория Касперского" | Система и способ повышения эффективности обнаружения неизвестных вредоносных объектов |
US8392408B1 (en) * | 2011-05-04 | 2013-03-05 | Google Inc. | Coordinating successive search queries using a query cursor |
US8555388B1 (en) | 2011-05-24 | 2013-10-08 | Palo Alto Networks, Inc. | Heuristic botnet detection |
US9158919B2 (en) * | 2011-06-13 | 2015-10-13 | Microsoft Technology Licensing, Llc | Threat level assessment of applications |
EP2610776B1 (en) | 2011-09-16 | 2019-08-21 | Veracode, Inc. | Automated behavioural and static analysis using an instrumented sandbox and machine learning classification for mobile security |
US9832211B2 (en) | 2012-03-19 | 2017-11-28 | Qualcomm, Incorporated | Computing device to detect malware |
-
2012
- 2012-03-19 US US13/424,251 patent/US9832211B2/en active Active
-
2013
- 2013-03-14 EP EP13713630.5A patent/EP2828789A1/en not_active Ceased
- 2013-03-14 CN CN201910919572.2A patent/CN110781496A/zh active Pending
- 2013-03-14 KR KR1020147029226A patent/KR102057565B1/ko active IP Right Grant
- 2013-03-14 JP JP2015501765A patent/JP6228966B2/ja active Active
- 2013-03-14 WO PCT/US2013/031184 patent/WO2013142228A1/en active Application Filing
- 2013-03-14 CN CN201380015079.9A patent/CN104205111A/zh active Pending
-
2014
- 2014-01-07 US US14/149,471 patent/US9973517B2/en active Active
Also Published As
Publication number | Publication date |
---|---|
US9973517B2 (en) | 2018-05-15 |
EP2828789A1 (en) | 2015-01-28 |
WO2013142228A1 (en) | 2013-09-26 |
US9832211B2 (en) | 2017-11-28 |
CN104205111A (zh) | 2014-12-10 |
US20140123289A1 (en) | 2014-05-01 |
JP2015511047A (ja) | 2015-04-13 |
US20130247187A1 (en) | 2013-09-19 |
KR102057565B1 (ko) | 2019-12-19 |
CN110781496A (zh) | 2020-02-11 |
KR20140137003A (ko) | 2014-12-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6228966B2 (ja) | マルウェアを検出するコンピューティングデバイス | |
Schmidt et al. | Monitoring smartphones for anomaly detection | |
US9357397B2 (en) | Methods and systems for detecting malware and attacks that target behavioral security mechanisms of a mobile device | |
US10104107B2 (en) | Methods and systems for behavior-specific actuation for real-time whitelisting | |
Shabtai et al. | Mobile malware detection through analysis of deviations in application network behavior | |
US9910984B2 (en) | Methods and systems for on-device high-granularity classification of device behaviors using multi-label models | |
US9606893B2 (en) | Methods and systems of generating application-specific models for the targeted protection of vital applications | |
US9774614B2 (en) | Methods and systems for side channel analysis detection and protection | |
US9609456B2 (en) | Methods, devices, and systems for communicating behavioral analysis information | |
EP3161711B1 (en) | Methods and systems for thwarting side channel attacks | |
US20170337372A1 (en) | Maliciousness Categorization of Application Packages Based on Dynamic Analysis | |
JP2017505944A (ja) | マルウェア検出検査方法及び装置 | |
CN112513848A (zh) | 隐私保护内容分类 | |
Shrivastava et al. | Android application behavioural analysis for data leakage | |
Kandukuru et al. | Android malicious application detection using permission vector and network traffic analysis | |
Stirparo et al. | In-memory credentials robbery on android phones | |
Su et al. | An Informative and Comprehensive Behavioral Characteristics Analysis Methodology of Android Application for Data Security in Brain‐Machine Interfacing | |
Tokmak et al. | Deep Learning Based Malware Detection Tool Development for Android Operating System | |
US20240070268A1 (en) | Aggregate Event Profiles for Detecting Malicious Mobile Applications | |
EP4373031A1 (en) | System and method for recognizing undersirable calls | |
US20240296222A1 (en) | Antimalware Systems and Methods Using Optimal Triggering of Artificial Intelligence Modules | |
Mazlan | Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF) | |
Κουλιαρίδης | _A data collection as a service of mobile malware behavioral patterns | |
Nasman | Malware Detection Based on Permissions on Android Platform Using Data Mining |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A529 | Written submission of copy of amendment under article 34 pct |
Free format text: JAPANESE INTERMEDIATE CODE: A529 Effective date: 20140929 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20160215 |
|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20160215 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20170130 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20170206 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20170421 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20170915 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20171016 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 6228966 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |