Method for scalable analysis of android applications for security vulnerability
    11.
    发明授权
    Method for scalable analysis of android applications for security vulnerability 有权
    Android应用程序可扩展分析方法的安全漏洞的方法

    公开(公告)号:US08875298B2

    公开(公告)日:2014-10-28

    申请号:US13768439

    申请日:2013-02-15

    CPC classification number: G06F21/577 G06F11/3604 G06F21/562 G06F2221/033

    Abstract: A method for scalable analysis of Android applications for security includes applying Android application analytics to an Android application, which in turn includes applying an application taint tracking to the Android application and applying application repacking detection to the Android application, and determining security vulnerabilities in the Android application responsive to the analytics.

    Abstract translation: Android应用程序的可扩展分析方法包括将Android应用程序分析应用于Android应用程序,Android应用程序分析应用程序将应用程序污染跟踪应用于Android应用程序,并将应用程序重新包装检测应用于Android应用程序,并确定Android中的安全漏洞 响应分析的应用程序。

    Template based data reduction for commercial data mining

    公开(公告)号:US11030157B2

    公开(公告)日:2021-06-08

    申请号:US15979514

    申请日:2018-05-15

    Abstract: Systems and methods for mining and compressing commercial data including a network of point of sale devices to log commercial activity data including independent commercial events and corresponding dependent features. A middleware system is in communication with the network of point of sale devices to continuously collect and compress a stream of the commercial activity data and concurrently store the compressed commercial activity data. Compressing the stream includes a file access table corresponding to the commercial activity data, producing compressible file access templates (CFATs) according to frequent patterns of commercial activity data using the file access table, and replacing dependent feature sequences with a matching compressible file access template. A database is in communication with the middleware system to store the compressed commercial data. A commercial pattern analysis system is in communication with the database to determine patterns in commercial activities across the network of point of sale devices.

    TIMELY CAUSALITY ANALYSIS IN HOMEGENEOUS ENTERPRISE HOSTS

    公开(公告)号:US20180336349A1

    公开(公告)日:2018-11-22

    申请号:US15972911

    申请日:2018-05-07

    Abstract: A method and system are provided for causality analysis of Operating System-level (OS-level) events in heterogeneous enterprise hosts. The method includes storing, by the processor, the OS-level events in a priority queue in a prioritized order based on priority scores determined from event rareness scores and event fanout scores for the OS-level events. The method includes processing, by the processor, the OS-level events stored in the priority queue in the prioritized order to provide a set of potentially anomalous ones of the OS-level events within a set amount of time. The method includes generating, by the processor, a dependency graph showing causal dependencies of at least the set of potentially anomalous ones of the OS-level events, based on results of the causality dependency analysis. The method includes initiating, by the processor, an action to improve a functioning of the hosts responsive to the dependency graph or information derived therefrom.

    METHOD AND SYSTEM FOR BEHAVIOR QUERY CONSTRUCTION IN TEMPORAL GRAPHS USING DISCRIMINATIVE SUB-TRACE MINING
    17.
    发明申请
    METHOD AND SYSTEM FOR BEHAVIOR QUERY CONSTRUCTION IN TEMPORAL GRAPHS USING DISCRIMINATIVE SUB-TRACE MINING 审中-公开
    使用明确的子跟踪挖掘的时间序列行为查询结构的方法和系统

    公开(公告)号:US20160125094A1

    公开(公告)日:2016-05-05

    申请号:US14932799

    申请日:2015-11-04

    CPC classification number: G06F16/9024 G06F21/552

    Abstract: A method and system for constructing behavior queries in temporal graphs using discriminative sub-trace mining. The method includes generating system data logs to provide temporal graphs, wherein the temporal graphs include a first temporal graph corresponding to a target behavior and a second temporal graph corresponding to a set of background behaviors, generating temporal graph patterns for each of the first and second temporal graphs to determine whether a pattern exists between a first temporal graph pattern and a second temporal graph pattern, wherein the pattern between the temporal graph patterns is a non-repetitive graph pattern, pruning the pattern between the first and second temporal graph patterns to provide a discriminative temporal graph, and generating behavior queries based on the discriminative temporal graph.

    Abstract translation: 一种使用区分性子跟踪挖掘在时间图中构建行为查询的方法和系统。 该方法包括生成系统数据日志以提供时间图,其中时间图包括对应于目标行为的第一时间图和对应于一组背景行为的第二时间图,为第一和第二 时间图以确定在第一时间图形图案和第二时间图形图案之间是否存在图案,其中时间图形图案之间的图案是非重复图形图案,修剪第一和第二时间图形图案之间的图案以提供 判别时间图,并基于辨别时间图生成行为查询。

    Method for Scalable Analysis of Android Applications for Security Vulnerability
    18.
    发明申请
    Method for Scalable Analysis of Android Applications for Security Vulnerability 有权
    Android应用程序可扩展分析安全漏洞的方法

    公开(公告)号:US20140059690A1

    公开(公告)日:2014-02-27

    申请号:US13768439

    申请日:2013-02-15

    CPC classification number: G06F21/577 G06F11/3604 G06F21/562 G06F2221/033

    Abstract: A method for scalable analysis of Android applications for security includes applying Android application analytics to an Android application, which in turn includes applying an application taint tracking to the Android application and applying application repacking detection to the Android application, and determining security vulnerabilities in the Android application responsive to the analytics.

    Abstract translation: Android应用程序的可扩展分析方法包括将Android应用程序分析应用于Android应用程序,Android应用程序分析应用程序将应用程序污染跟踪应用于Android应用程序,并将应用程序重新包装检测应用于Android应用程序,并确定Android中的安全漏洞 响应分析的应用程序。

Patent Agency Ranking