METHODS AND SYSTEMS FOR AUTOMATED ANONYMOUS CROWDSOURCING OF CHARACTERIZED DEVICE BEHAVIORS
    11.
    发明申请
    METHODS AND SYSTEMS FOR AUTOMATED ANONYMOUS CROWDSOURCING OF CHARACTERIZED DEVICE BEHAVIORS 审中-公开
    用于自动化特征化设备行为的方法和系统

    公开(公告)号:WO2016148840A1

    公开(公告)日:2016-09-22

    申请号:PCT/US2016/018669

    申请日:2016-02-19

    Abstract: Methods, and devices implementing the methods, use device-specific classifiers in a privacy-preserving behavioral monitoring and analysis system for crowd-sourcing of device behaviors. Diverse devices having varying degrees of "smart" capabilities may monitor operational behaviors. Gathered operational behavior information may be transmitted to a nearby device having greater processing capabilities than a respective collecting device, or may be transmitted directly to an "always on" device. The behavior information may be used to generate behavior vectors, which may be analyzed for anomalies. Vectors containing anomaly flags may be anonymized to remove any user-identifying information and subsequently transmitted to a remote recipient such as a service provider or device manufacture. In this manner, operational behavior information may be gathered about different devices from a large number of users, to obtain statistical analysis of operational behavior for specific makes and models of devices, without divulging personal information about device users.

    Abstract translation: 方法和实现方法的设备在隐私保护行为监控和分析系统中使用设备特定的分类器,用于人群来源的设备行为。 具有不同程度的“智能”能力的不同装置可以监视操作行为。 聚集的操作行为信息可以被发送到具有比相应的收集装置更大的处理能力的附近设备,或者可以直接传送到“始终处于”设备。 行为信息可以用于生成行为矢量,可以对异常进行分析。 可以对包含异常标志的向量进行匿名处理,以消除任何用户识别信息,并随后发送到诸如服务提供商或设备制造的远程接收者。 以这种方式,可以从大量用户收集关于不同设备的操作行为信息,以获得关于特定设备和型号的操作行为的统计分析,而不泄漏关于设备用户的个人信息。

    PRE-IDENTIFYING PROBABLE MALICIOUS ROOTKIT BEHAVIOR USING BEHAVIORAL CONTRACTS
    12.
    发明申请
    PRE-IDENTIFYING PROBABLE MALICIOUS ROOTKIT BEHAVIOR USING BEHAVIORAL CONTRACTS 审中-公开
    使用行为合同预先识别可疑的恶性循环行为

    公开(公告)号:WO2015080871A1

    公开(公告)日:2015-06-04

    申请号:PCT/US2014/065528

    申请日:2014-11-13

    CPC classification number: G06F21/56 G06F21/566

    Abstract: The various aspects provide for a computing device and methods implemented by the device to ensure that an application executing on the device and seeking root access will not cause malicious behavior while after receiving root access. Before giving the application root access, the computing device may identify operations the application intends to execute while having root access, determine whether executing the operations will cause malicious behavior by simulating execution of the operations, and pre-approve those operations after determining that executing those operations will not result in malicious behavior. Further, after giving the application root access, the computing device may only allow the application to perform pre-approved operations by quickly checking the application's pending operations against the pre-approved operations before allowing the application to perform those operations. Thus, the various aspects may ensure that an application receives root access without compromising the performance or security integrity of the computing device.

    Abstract translation: 各种方面提供了一种计算设备和由设备实现的方法,以确保在接收根访问之后在设备上执行并寻求root访问的应用不会引起恶意行为。 在给予应用程序根访问之前,计算设备可以识别应用程序在具有root访问的同时执行的操作,确定执行操作是否会通过模拟操作的执行而导致恶意行为,并且在确定执行这些操作之后预先批准这些操作 操作不会导致恶意行为。 此外,在给予应用程序根访问之后,计算设备可以仅允许应用程序通过在允许应用程序执行这些操作之前快速检查应用程序针对预先批准的操作的待处理操作来执行预先批准的操作。 因此,各个方面可以确保应用程序接收根访问,而不会影响计算设备的性能或安全完整性。

    OPTIMIZATION OF HARDWARE MONITORING FOR COMPUTING DEVICES
    14.
    发明申请
    OPTIMIZATION OF HARDWARE MONITORING FOR COMPUTING DEVICES 审中-公开
    计算机硬件监控优化

    公开(公告)号:WO2016148837A1

    公开(公告)日:2016-09-22

    申请号:PCT/US2016/018659

    申请日:2016-02-19

    Abstract: Various aspects provide systems and methods for optimizing hardware monitoring on a computing device. A computing device may receive a monitoring request to monitor a portion of code or data within a process executing on the computing device. The computing device may generate from the monitoring request a first monitoring configuration parameter for a first hardware monitoring component in the computing device and may identify a non-optimal event pattern that occurs while the first hardware monitoring component monitors the portion of code or data according to the first monitoring configuration parameter. The computing device may apply a transformation to the portion of code or data and reconfigure the first hardware monitoring component by modifying the first monitoring configuration parameter in response to the transformation of the portion of code or data.

    Abstract translation: 各个方面提供用于优化计算设备上的硬件监视的系统和方法。 计算设备可以接收监视请求以监视在计算设备上执行的过程中的代码或数据的一部分。 所述计算设备可以从所述监视请求生成所述计算设备中的第一硬件监视组件的第一监视配置参数,并且可以识别当所述第一硬件监视组件根据所述第一硬件监视组件监视所述代码或数据的所述部分时发生的非最佳事件模式 第一个监控配置参数。 计算设备可以对代码或数据的一部分应用变换,并且通过响应于代码或数据的部分的变换来修改第一监视配置参数来重新配置第一硬件监控组件。

    ADAPTIVE OBSERVATION OF DETERMINED BEHAVIORAL FEATURES ON A MOBILE DEVICE
    15.
    发明申请
    ADAPTIVE OBSERVATION OF DETERMINED BEHAVIORAL FEATURES ON A MOBILE DEVICE 审中-公开
    自适应观察移动设备上确定的行为特征

    公开(公告)号:WO2015112760A1

    公开(公告)日:2015-07-30

    申请号:PCT/US2015/012525

    申请日:2015-01-22

    Abstract: Detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources. In an embodiment, a method for observing mobile device behaviors over a period of time to recognize mobile device behaviors inconsistent with normal operation patterns is disclosed. The method comprises determining in a processor of a mobile device a feature that is to be observed in the mobile device in order to identify a suspicious behavior of the mobile device, and adaptively observing the determined feature by collecting behavior information from a hardware component associated with the determined feature.

    Abstract translation: 智能地,动态地和/或自适应地检测待观察的计算设备行为,要观察的行为的数量以及移动设备行为的细节或粒度的级别来检测可疑或性能降级的移动设备行为 要观察。 各个方面有效地识别可疑或降低性能的移动设备行为,而不需要过多的处理,存储器或能量资源。 在一个实施例中,公开了一种在一段时间内观察移动设备行为以识别与正常操作模式不一致的移动设备行为的方法。 该方法包括在移动设备的处理器中确定要在移动设备中观察到的特征,以便识别移动设备的可疑行为,并且通过从与硬件组件相关联的硬件组件收集行为信息来自适应地观察所确定的特征 确定的功能。

    DYNAMIC HONEYPOT SYSTEM
    20.
    发明公开

    公开(公告)号:EP3375159A1

    公开(公告)日:2018-09-19

    申请号:EP16788852.8

    申请日:2016-10-11

    Abstract: Various embodiments include a honeypot system configured to trigger malicious activities by malicious applications using a behavioral analysis algorithm and dynamic resource provisioning. A method performed by a processor of a computing device, which may be a mobile computing device, may include determining whether or not a target application currently executing on the computing device is potentially malicious based, at least in part, on the analysis, predicting a triggering condition of the target application in response to determining the target application is potentially malicious, provisioning one or more resources based, at least in part, on the predicted triggering condition, monitoring activities of the target application corresponding to the provisioned one or more resources, and determining whether or not the target application is a malicious application based, at least in part, on the monitored activities. The resources may be device components (e.g., network interface(s), sensor(s), etc.) and/or data (e.g., files, etc.).

Patent Agency Ranking