JP6013613B2 - モバイル・アプリケーション管理 - Google Patents
モバイル・アプリケーション管理 Download PDFInfo
- Publication number
- JP6013613B2 JP6013613B2 JP2015534833A JP2015534833A JP6013613B2 JP 6013613 B2 JP6013613 B2 JP 6013613B2 JP 2015534833 A JP2015534833 A JP 2015534833A JP 2015534833 A JP2015534833 A JP 2015534833A JP 6013613 B2 JP6013613 B2 JP 6013613B2
- Authority
- JP
- Japan
- Prior art keywords
- application
- user
- behavior
- behaviors
- mode
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/40—Transformation of program code
- G06F8/41—Compilation
- G06F8/43—Checking; Contextual analysis
- G06F8/436—Semantic checking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/03—Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
- G06F2221/033—Test or assess software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2113—Multi-level security, e.g. mandatory access control
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computational Linguistics (AREA)
- Databases & Information Systems (AREA)
- Bioethics (AREA)
- Virology (AREA)
- Stored Programmes (AREA)
- Information Transfer Between Computers (AREA)
Description
AppDeveloper Rating=f(アプリケーションの総数,アプリケーションにおける望ましくない挙動の重み付き平均,アプリケーションの人気、低レーティングの平均レシオ)
例えば、1つの例示的な例において、望ましくない挙動の重み付き平均は、開発者のアプリケーションのセットに対して生成され得る:
平均重み=総重み/アプリケーションの総数
により導出され得る。
モード1は管理者レベル・モードである;
モード2はゲスト・レベル・モードである;
モード3はゲスト・レベル・モードである;
モード4は低特権モードである
そして、階層は、いくつかある例示的な実施例の中でもとりわけ、モード1>モード2及びモード3>モード4であり、モード2はモード3と同じレベルであると定義される。
Claims (10)
- 命令を記憶した少なくとも1つのマシンアクセス可能な記憶媒体であって、前記命令がマシン上で実行されたとき、前記命令は、前記マシンに、
特定のプラットフォームのソフトウェア開発キットのセマンティック・モデルに対して特定のアプリケーションのコードを解析させ、ここで、前記セマンティック・モデルは、複数のアプリケーション挙動を、前記特定のプラットフォームのそれぞれのアプリケーション・プログラミング・インタフェース(API)コールに関連付け、前記特定のアプリケーションの前記コードは、前記特定のアプリケーションを特定のユーザ・デバイス上で実施する試みに関して解析され;
前記コードの前記解析に基づいて、前記特定のアプリケーションの挙動のセットを識別させ;
前記挙動のセットのうちの特定の挙動が望ましくない挙動であると識別させ、ここで、前記挙動のセットのうちの特定の挙動が望ましくない挙動であると識別させることは、1以上の挙動が1以上のルールに違反すると判定させることを含み;
前記挙動のセットのうちの1以上の挙動が望ましくない挙動であるとの識別に基づいて、前記特定のユーザ・デバイスへの前記特定のアプリケーションのインストールをブロックさせる、
記憶媒体。 - 前記1以上のルールは、特定のユーザに関連付けられている、
請求項1記載の記憶媒体。 - 前記1以上のルールの少なくとも一部は、前記特定のユーザにより定義されたルールを含む、
請求項2記載の記憶媒体。 - 前記1以上のルールは、ネットワーク・サービス・プロバイダに関連付けられている、
請求項1記載の記憶媒体。 - ユーザ入力が、前記特定の挙動が望ましくないと識別する、
請求項1記載の記憶媒体。 - 前記ユーザ入力は、前記の識別された挙動のセットの人間が読み取り可能な説明を表示するユーザ・インタフェースに関して受信される、
請求項5記載の記憶媒体。 - 前記人間が読み取り可能な説明は、該説明を生成するためのテンプレートと、前記セマンティック・モデルとを用いて生成される、
請求項6記載の記憶媒体。 - 前記特定のユーザ・デバイスは、スマートフォン及びタブレット・コンピューティング・デバイスのうちの1つである、
請求項1記載の記憶媒体。 - 特定のプラットフォームのソフトウェア開発キットのセマンティック・モデルに対して特定のアプリケーションのコードを解析する解析ステップであって、前記セマンティック・モデルは、複数のアプリケーション挙動を、前記特定のプラットフォームのそれぞれのアプリケーション・プログラミング・インタフェース(API)コールに関連付け、前記特定のアプリケーションの前記コードは、前記特定のアプリケーションを特定のユーザ・デバイス上で実施する試みに関して解析される、解析ステップと、
前記コードの前記解析に基づいて、前記特定のアプリケーションの挙動のセットを識別するステップと、
前記挙動のセットのうちの特定の挙動が望ましくない挙動であると識別するステップと、
前記挙動のセットのうちの1以上の挙動が望ましくない挙動であるとの識別に基づいて、前記特定のユーザ・デバイスへの前記特定のアプリケーションのインストールをブロックするステップと、
を含む、方法であって、
前記特定のアプリケーションのコードを制御フローに逆アセンブルし、前記セマンティック・モデルに少なくとも部分的に基づいて、前記特定のアプリケーションに関するアプリケーション・ロジックのモデルを生成するステップ
をさらに含む、
方法。 - 前記アプリケーション・ロジックのモデルは、さらに、アンビエント・アプリケーション・ナレッジに少なくとも部分的に基づく、
請求項9記載の方法。
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IN1215KO2012 | 2012-10-19 | ||
IN1215/KOL/2012 | 2012-10-19 | ||
PCT/US2013/065799 WO2014063124A1 (en) | 2012-10-19 | 2013-10-18 | Mobile application management |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2015534690A JP2015534690A (ja) | 2015-12-03 |
JP6013613B2 true JP6013613B2 (ja) | 2016-10-25 |
Family
ID=50488809
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2015534833A Active JP6013613B2 (ja) | 2012-10-19 | 2013-10-18 | モバイル・アプリケーション管理 |
Country Status (5)
Country | Link |
---|---|
US (3) | US20150220734A1 (ja) |
EP (1) | EP2909775B1 (ja) |
JP (1) | JP6013613B2 (ja) |
CN (1) | CN104662547A (ja) |
WO (1) | WO2014063124A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11392694B2 (en) | 2018-10-04 | 2022-07-19 | Samsung Electronics Co., Ltd. | Electronic apparatus and controlling method thereof |
JP7622538B2 (ja) | 2021-04-27 | 2025-01-28 | 株式会社オートネットワーク技術研究所 | ワイヤーハーネス |
Families Citing this family (70)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9589129B2 (en) | 2012-06-05 | 2017-03-07 | Lookout, Inc. | Determining source of side-loaded software |
US9407443B2 (en) | 2012-06-05 | 2016-08-02 | Lookout, Inc. | Component analysis of software applications on computing devices |
JP6013613B2 (ja) | 2012-10-19 | 2016-10-25 | マカフィー, インコーポレイテッド | モバイル・アプリケーション管理 |
US9104867B1 (en) * | 2013-03-13 | 2015-08-11 | Fireeye, Inc. | Malicious content analysis using simulated user interaction without user involvement |
JP5741722B1 (ja) * | 2014-01-28 | 2015-07-01 | 日本電気株式会社 | 情報処理装置、及び、情報処理方法 |
WO2015123468A1 (en) * | 2014-02-12 | 2015-08-20 | Mobile Heartbeat Llc | System for setting and controlling functionalities of mobile devices |
US9245123B1 (en) * | 2014-05-07 | 2016-01-26 | Symantec Corporation | Systems and methods for identifying malicious files |
JP6042371B2 (ja) * | 2014-05-19 | 2016-12-14 | 株式会社オプティム | 端末データ管理サーバ、端末データ管理方法、及び、端末データ管理サーバ用プログラム |
US9652615B1 (en) | 2014-06-25 | 2017-05-16 | Symantec Corporation | Systems and methods for analyzing suspected malware |
US10445499B1 (en) * | 2014-06-26 | 2019-10-15 | Palo Alto Networks, Inc. | Grouping application components for classification and malware detection |
US10019569B2 (en) * | 2014-06-27 | 2018-07-10 | Qualcomm Incorporated | Dynamic patching for diversity-based software security |
US11507663B2 (en) | 2014-08-11 | 2022-11-22 | Sentinel Labs Israel Ltd. | Method of remediating operations performed by a program and system thereof |
US9967278B2 (en) | 2014-10-21 | 2018-05-08 | Proofpoint, Inc. | Systems and methods for application security analysis |
US9838391B2 (en) | 2014-10-31 | 2017-12-05 | Proofpoint, Inc. | Systems and methods for privately performing application security analysis |
US20160191645A1 (en) * | 2014-12-30 | 2016-06-30 | Citrix Systems, Inc. | Containerizing Web Applications for Managed Execution |
US20160232353A1 (en) * | 2015-02-09 | 2016-08-11 | Qualcomm Incorporated | Determining Model Protection Level On-Device based on Malware Detection in Similar Devices |
US9332385B1 (en) | 2015-02-13 | 2016-05-03 | International Business Machines Corporation | Selectively providing content to users located within a virtual perimeter |
US20160299977A1 (en) * | 2015-04-13 | 2016-10-13 | Quixey, Inc. | Action-Based App Recommendation Engine |
WO2016178816A1 (en) | 2015-05-01 | 2016-11-10 | Lookout, Inc. | Determining source of side-loaded software |
US10509806B2 (en) | 2015-08-17 | 2019-12-17 | Accenture Global Solutions Limited | Recommendation engine for aggregated platform data |
CN105184118B (zh) * | 2015-08-31 | 2018-02-23 | 西北大学 | 一种基于代码碎片化的Android应用程序加壳保护方法及装置 |
CN105307137B (zh) * | 2015-09-18 | 2019-05-07 | 小米科技有限责任公司 | 短信读取方法及装置 |
CN105260673A (zh) | 2015-09-18 | 2016-01-20 | 小米科技有限责任公司 | 短信读取方法及装置 |
CN105303120B (zh) | 2015-09-18 | 2020-01-10 | 小米科技有限责任公司 | 短信读取方法及装置 |
US10373140B1 (en) | 2015-10-26 | 2019-08-06 | Intuit Inc. | Method and system for detecting fraudulent bill payment transactions using dynamic multi-parameter predictive modeling |
US20170142156A1 (en) * | 2015-11-12 | 2017-05-18 | Toyota Infotechnology Center Usa, Inc. | Application Assurance for Open Platform In-Vehicle Infotainment System |
CN108475315A (zh) * | 2016-01-27 | 2018-08-31 | 竹田优太 | 处理系统、处理方法及程序 |
US9501274B1 (en) | 2016-01-29 | 2016-11-22 | International Business Machines Corporation | Qualitative feedback correlator |
US10893059B1 (en) | 2016-03-31 | 2021-01-12 | Fireeye, Inc. | Verification and enhancement using detection systems located at the network periphery and endpoint devices |
US10826933B1 (en) | 2016-03-31 | 2020-11-03 | Fireeye, Inc. | Technique for verifying exploit/malware at malware detection appliance through correlation with endpoints |
WO2017205802A1 (en) * | 2016-05-27 | 2017-11-30 | App Annie Inc. | Advertisement data metric determination within mobile applications |
US10083452B1 (en) | 2016-06-21 | 2018-09-25 | Intuit Inc. | Method and system for identifying potentially fraudulent bill and invoice payments |
US20180033089A1 (en) * | 2016-07-27 | 2018-02-01 | Intuit Inc. | Method and system for identifying and addressing potential account takeover activity in a financial system |
US10621333B2 (en) * | 2016-08-08 | 2020-04-14 | International Business Machines Corporation | Install-time security analysis of mobile applications |
WO2018081629A1 (en) * | 2016-10-28 | 2018-05-03 | Tala Security, Inc. | Application security service |
US11087334B1 (en) | 2017-04-04 | 2021-08-10 | Intuit Inc. | Method and system for identifying potential fraud activity in a tax return preparation system, at least partially based on data entry characteristics of tax return content |
US10917423B2 (en) | 2017-05-15 | 2021-02-09 | Forcepoint, LLC | Intelligently differentiating between different types of states and attributes when using an adaptive trust profile |
US10129269B1 (en) | 2017-05-15 | 2018-11-13 | Forcepoint, LLC | Managing blockchain access to user profile information |
US10623431B2 (en) | 2017-05-15 | 2020-04-14 | Forcepoint Llc | Discerning psychological state from correlated user behavior and contextual information |
US10999297B2 (en) | 2017-05-15 | 2021-05-04 | Forcepoint, LLC | Using expected behavior of an entity when prepopulating an adaptive trust profile |
US10943019B2 (en) | 2017-05-15 | 2021-03-09 | Forcepoint, LLC | Adaptive trust profile endpoint |
US10447718B2 (en) | 2017-05-15 | 2019-10-15 | Forcepoint Llc | User profile definition and management |
US10862927B2 (en) | 2017-05-15 | 2020-12-08 | Forcepoint, LLC | Dividing events into sessions during adaptive trust profile operations |
US10999296B2 (en) | 2017-05-15 | 2021-05-04 | Forcepoint, LLC | Generating adaptive trust profiles using information derived from similarly situated organizations |
US9882918B1 (en) | 2017-05-15 | 2018-01-30 | Forcepoint, LLC | User behavior profile in a blockchain |
US10218697B2 (en) | 2017-06-09 | 2019-02-26 | Lookout, Inc. | Use of device risk evaluation to manage access to services |
US10318729B2 (en) | 2017-07-26 | 2019-06-11 | Forcepoint, LLC | Privacy protection during insider threat monitoring |
WO2019032728A1 (en) | 2017-08-08 | 2019-02-14 | Sentinel Labs, Inc. | METHODS, SYSTEMS AND DEVICES FOR DYNAMICALLY MODELING AND REGROUPING END POINTS FOR ONBOARD NETWORKING |
US11829866B1 (en) | 2017-12-27 | 2023-11-28 | Intuit Inc. | System and method for hierarchical deep semi-supervised embeddings for dynamic targeted anomaly detection |
US10607021B2 (en) | 2018-01-26 | 2020-03-31 | Bank Of America Corporation | Monitoring usage of an application to identify characteristics and trigger security control |
US20190294780A1 (en) * | 2018-03-26 | 2019-09-26 | International Business Machines Corporation | System and method for executing operating system level virtualization software objects |
JP7179482B2 (ja) * | 2018-04-19 | 2022-11-29 | キヤノン株式会社 | 情報処理装置、制御方法、およびそのプログラム |
CN108763908B (zh) * | 2018-06-01 | 2023-04-18 | 腾讯科技(深圳)有限公司 | 行为向量生成方法、装置、终端及存储介质 |
US11233779B2 (en) * | 2018-06-03 | 2022-01-25 | Apple Inc. | Wireless credential sharing |
US11048390B2 (en) * | 2018-06-25 | 2021-06-29 | MI Technical Solutions, Inc. | Auto-reformatting of home screen graphical user interface depicting only administrator-approved applications |
US11474978B2 (en) | 2018-07-06 | 2022-10-18 | Capital One Services, Llc | Systems and methods for a data search engine based on data profiles |
US10460235B1 (en) | 2018-07-06 | 2019-10-29 | Capital One Services, Llc | Data model generation using generative adversarial networks |
US10489224B1 (en) | 2018-07-30 | 2019-11-26 | International Business Machines Corporation | Managing application programming interface requests |
CN109002731A (zh) * | 2018-07-31 | 2018-12-14 | 佛山长意云信息技术有限公司 | 一种社交软件管理方法、装置、计算机设备及存储介质 |
CN109241734A (zh) * | 2018-08-10 | 2019-01-18 | 航天信息股份有限公司 | 一种防护软件运行效率优化方法及系统 |
CN109189221B (zh) * | 2018-08-23 | 2021-07-16 | 郑州航空工业管理学院 | 一种跨手机平台的用户行为识别方法 |
US11741196B2 (en) | 2018-11-15 | 2023-08-29 | The Research Foundation For The State University Of New York | Detecting and preventing exploits of software vulnerability using instruction tags |
US10853496B2 (en) | 2019-04-26 | 2020-12-01 | Forcepoint, LLC | Adaptive trust profile behavioral fingerprint |
US10762200B1 (en) * | 2019-05-20 | 2020-09-01 | Sentinel Labs Israel Ltd. | Systems and methods for executable code detection, automatic feature extraction and position independent code detection |
CN110244691B (zh) * | 2019-06-19 | 2021-04-09 | 深圳市道通科技股份有限公司 | 一种汽车诊断方法、装置及系统 |
US11194559B2 (en) * | 2019-08-06 | 2021-12-07 | Saudi Arabian Oil Company | Method and apparatus for platform as a service (PaaS) automation control |
US12216791B2 (en) | 2020-02-24 | 2025-02-04 | Forcepoint Llc | Re-identifying pseudonymized or de-identified data utilizing distributed ledger technology |
KR20210115520A (ko) * | 2020-03-13 | 2021-09-27 | 현대자동차주식회사 | 퍼스널 모빌리티 및 그 제어 방법 |
TWI765690B (zh) * | 2021-04-30 | 2022-05-21 | 精品科技股份有限公司 | 基於觀察模式之應用程式控管方法 |
US11899782B1 (en) | 2021-07-13 | 2024-02-13 | SentinelOne, Inc. | Preserving DLL hooks |
Family Cites Families (46)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6073142A (en) | 1997-06-23 | 2000-06-06 | Park City Group | Automated post office based rule analysis of e-mail messages and other data objects for controlled distribution in network environments |
US5987610A (en) | 1998-02-12 | 1999-11-16 | Ameritech Corporation | Computer virus screening methods and systems |
US6460050B1 (en) | 1999-12-22 | 2002-10-01 | Mark Raymond Pace | Distributed content identification system |
US6901519B1 (en) | 2000-06-22 | 2005-05-31 | Infobahn, Inc. | E-mail virus protection system and method |
US7536472B2 (en) * | 2001-09-13 | 2009-05-19 | Network Foundation Technologies, Llc | Systems for distributing data over a computer network and methods for arranging nodes for distribution of data over a computer network |
EP1329787B1 (en) | 2002-01-16 | 2019-08-28 | Texas Instruments Incorporated | Secure mode indicator for smart phone or PDA |
GB2383444B (en) * | 2002-05-08 | 2003-12-03 | Gfi Software Ltd | System and method for detecting a potentially malicious executable file |
US20040088588A1 (en) * | 2002-10-31 | 2004-05-06 | International Business Machines Corporation | Limited resource access while power-on-password is active |
US7437675B2 (en) | 2003-02-03 | 2008-10-14 | Hewlett-Packard Development Company, L.P. | System and method for monitoring event based systems |
JP4164036B2 (ja) * | 2004-02-05 | 2008-10-08 | トレンドマイクロ株式会社 | ネットワークを介して提供されるプログラムに対する受信装置上でのセキュリティの確保 |
JP4583808B2 (ja) * | 2004-05-17 | 2010-11-17 | パナソニック株式会社 | プログラム実行制御装置及びプログラム実行制御方法 |
US20060015940A1 (en) * | 2004-07-14 | 2006-01-19 | Shay Zamir | Method for detecting unwanted executables |
DE602004013321T2 (de) * | 2004-10-06 | 2009-05-20 | Nokia Corp. | Zugriffssteuerung für Kommunikationsendgerät |
JP4676499B2 (ja) * | 2004-11-04 | 2011-04-27 | テルコーディア ライセンシング カンパニー, リミテッド ライアビリティ カンパニー | ネットワークフロー内のエクスプロイトコードの検出 |
US7549144B2 (en) * | 2005-02-22 | 2009-06-16 | Microsoft Corporation | Custom API modeling for source code static analysis simulator |
US7818800B1 (en) | 2005-08-05 | 2010-10-19 | Symantec Corporation | Method, system, and computer program product for blocking malicious program behaviors |
CN101243400B (zh) * | 2005-08-16 | 2015-03-25 | Emc公司 | 信息保护方法和系统 |
KR101359324B1 (ko) * | 2006-03-27 | 2014-02-24 | 텔레콤 이탈리아 소시에떼 퍼 아찌오니 | 이동 통신 장치상의 보안 정책 시행 방법 |
US20080083031A1 (en) | 2006-12-20 | 2008-04-03 | Microsoft Corporation | Secure service computation |
US8407675B1 (en) | 2007-02-06 | 2013-03-26 | The United States Of America As Represented By The Secretary Of The Navy | Extraction of executable code and translation to alternate platform |
CN100461132C (zh) * | 2007-03-02 | 2009-02-11 | 北京邮电大学 | 基于源代码静态分析的软件安全代码分析器及其检测方法 |
US9158538B2 (en) * | 2007-05-21 | 2015-10-13 | International Business Machines Corporation | User-extensible rule-based source code modification |
US7825820B2 (en) * | 2007-09-28 | 2010-11-02 | Apple Inc. | Security using electronic devices |
JP2009130856A (ja) * | 2007-11-27 | 2009-06-11 | Nec Corp | 携帯端末、アプリケーション実行方法、コンピュータプログラム、およびシステム |
CN101266550B (zh) * | 2007-12-21 | 2011-02-16 | 北京大学 | 一种恶意代码检测方法 |
JP5577527B2 (ja) * | 2008-06-25 | 2014-08-27 | 日本電気株式会社 | 情報処理システム、個人用情報機器及びアクセス管理方法 |
US8347386B2 (en) * | 2008-10-21 | 2013-01-01 | Lookout, Inc. | System and method for server-coupled malware prevention |
JP5440973B2 (ja) * | 2009-02-23 | 2014-03-12 | 独立行政法人情報通信研究機構 | コンピュータ検査システム、コンピュータ検査方法 |
JP5302711B2 (ja) * | 2009-02-25 | 2013-10-02 | 日本電信電話株式会社 | クライアント端末、ネットワーク接続制御方法、端末管理プロセッサ、プログラム |
JP2010257150A (ja) * | 2009-04-23 | 2010-11-11 | Ntt Docomo Inc | 不正処理検知装置、不正処理検知方法及びプログラム |
KR101351170B1 (ko) * | 2009-06-16 | 2014-01-14 | 인텔 코오퍼레이션 | 핸드헬드 디바이스의 카메라 응용 |
US20100328032A1 (en) * | 2009-06-24 | 2010-12-30 | Broadcom Corporation | Security for computing unit with femtocell ap functionality |
KR101632203B1 (ko) * | 2010-03-17 | 2016-06-22 | 삼성전자주식회사 | 휴대 단말기의 어플리케이션 실행 방법 및 장치 |
FI20106335A0 (fi) * | 2010-12-17 | 2010-12-17 | Pocketsoft Oy | Räätälöidyn sovelluksen tuottaminen käyttäjän päätelaitteelle |
EP2659348A4 (en) * | 2010-12-27 | 2017-01-25 | Nokia Technologies Oy | Method and apparatus for providing input suggestions |
US9003544B2 (en) | 2011-07-26 | 2015-04-07 | Kaspersky Lab Zao | Efficient securing of data on mobile devices |
US9063964B2 (en) | 2012-01-04 | 2015-06-23 | Trustgo Mobile, Inc. | Detecting application harmful behavior and grading application risks for mobile devices |
US9264556B2 (en) * | 2012-01-27 | 2016-02-16 | Microsoft Technology Licensing, Llc | On-device attribution of network data usage |
US9325806B2 (en) * | 2012-02-24 | 2016-04-26 | Qualcomm Incorporated | Cooperative loading of webpages based on shared meta information |
US9378390B2 (en) * | 2012-03-30 | 2016-06-28 | Nokia Technologies Oy | Method and apparatus for policy adaption based on application policy compliance analysis |
US9202047B2 (en) * | 2012-05-14 | 2015-12-01 | Qualcomm Incorporated | System, apparatus, and method for adaptive observation of mobile device behavior |
US9230076B2 (en) * | 2012-08-30 | 2016-01-05 | Microsoft Technology Licensing, Llc | Mobile device child share |
US8819855B2 (en) * | 2012-09-10 | 2014-08-26 | Mdi Security, Llc | System and method for deploying handheld devices to secure an area |
US9104870B1 (en) * | 2012-09-28 | 2015-08-11 | Palo Alto Networks, Inc. | Detecting malware |
JP6013613B2 (ja) | 2012-10-19 | 2016-10-25 | マカフィー, インコーポレイテッド | モバイル・アプリケーション管理 |
US9298361B2 (en) * | 2013-03-15 | 2016-03-29 | Apple Inc. | Analyzing applications for different access modes |
-
2013
- 2013-10-18 JP JP2015534833A patent/JP6013613B2/ja active Active
- 2013-10-18 EP EP13848027.2A patent/EP2909775B1/en active Active
- 2013-10-18 CN CN201380048869.7A patent/CN104662547A/zh active Pending
- 2013-10-18 US US14/126,866 patent/US20150220734A1/en not_active Abandoned
- 2013-10-18 WO PCT/US2013/065799 patent/WO2014063124A1/en active Application Filing
-
2017
- 2017-07-18 US US15/652,623 patent/US10114950B2/en active Active
-
2018
- 2018-09-21 US US16/138,904 patent/US11157616B2/en active Active
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11392694B2 (en) | 2018-10-04 | 2022-07-19 | Samsung Electronics Co., Ltd. | Electronic apparatus and controlling method thereof |
JP7622538B2 (ja) | 2021-04-27 | 2025-01-28 | 株式会社オートネットワーク技術研究所 | ワイヤーハーネス |
Also Published As
Publication number | Publication date |
---|---|
US20150220734A1 (en) | 2015-08-06 |
JP2015534690A (ja) | 2015-12-03 |
EP2909775A1 (en) | 2015-08-26 |
US10114950B2 (en) | 2018-10-30 |
EP2909775B1 (en) | 2022-01-26 |
CN104662547A (zh) | 2015-05-27 |
WO2014063124A1 (en) | 2014-04-24 |
US20190026464A1 (en) | 2019-01-24 |
US20180089431A1 (en) | 2018-03-29 |
US11157616B2 (en) | 2021-10-26 |
EP2909775A4 (en) | 2016-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6013613B2 (ja) | モバイル・アプリケーション管理 | |
US10565378B1 (en) | Exploit of privilege detection framework | |
EP2756437B1 (en) | Device-tailored whitelists | |
US9547765B2 (en) | Validating a type of a peripheral device | |
JP6290339B2 (ja) | 障害のあるユーザのためのapiを使用したデータへのアクセスを制御するためのシステムおよび方法 | |
US9223941B2 (en) | Using a URI whitelist | |
WO2019156786A1 (en) | Processing network traffic based on assessed security weaknesses | |
US20150180908A1 (en) | System and method for whitelisting applications in a mobile network environment | |
WO2013059131A1 (en) | System and method for whitelisting applications in a mobile network environment | |
GB2551813A (en) | Mobile device policy enforcement | |
US20210306375A1 (en) | Live forensic browsing of urls | |
Kafle et al. | A study of data store-based home automation | |
US11973796B2 (en) | Dangling domain detection and access mitigation | |
Kafle et al. | Security in centralized data store-based home automation platforms: A systematic analysis of nest and hue | |
US9323936B2 (en) | Using a file whitelist | |
JP6634055B2 (ja) | ユーザによるアプリケーションの不公平な評価を防止するシステム及び方法 | |
Egners et al. | Hackers in your pocket: A survey of smartphone security across platforms | |
Karthick et al. | Static analysis tool for identification of permission misuse by android applications | |
Hidhaya et al. | Supplementary event-listener injection attack in smart phones | |
US20160378982A1 (en) | Local environment protection method and protection system of terminal responding to malicious code in link information | |
Nazar et al. | Rooting Android–Extending the ADB by an auto-connecting WiFi-accessible service | |
Kulkarni | Android Malware Detection through Permission and App Component Analysis using Machine Learning Algorithms | |
Burgos et al. | Jailbreak Vulnerability & Mobile Security Updates | |
Sharma et al. | Spyware Detection based upon Hybrid Approach in Android Smartphones | |
Schwendemann | ERNW NEWSLETTER 55/SEPTEMBER 2016 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20160331 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20160419 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20160715 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20160823 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20160921 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 6013613 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |
|
S533 | Written request for registration of change of name |
Free format text: JAPANESE INTERMEDIATE CODE: R313533 |
|
R350 | Written notification of registration of transfer |
Free format text: JAPANESE INTERMEDIATE CODE: R350 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |
|
R250 | Receipt of annual fees |
Free format text: JAPANESE INTERMEDIATE CODE: R250 |