Systems and methods for combining static and dynamic code analysis
    1.
    发明授权
    Systems and methods for combining static and dynamic code analysis 有权
    用于组合静态和动态代码分析的系统和方法

    公开(公告)号:US08726392B1

    公开(公告)日:2014-05-13

    申请号:US13434416

    申请日:2012-03-29

    摘要: A computer-implemented method for combining static and dynamic code analysis may include 1) identifying executable code that is to be analyzed to determine whether the executable code is capable of leaking sensitive data, 2) performing a static analysis of the executable code to identify one or more objects which the executable code may use to transfer sensitive data, the static analysis being performed by analyzing the executable code without executing the executable code, 3) using a result of the static analysis to tune a dynamic analysis to track the one or more objects identified during the static analysis, and 4) performing the dynamic analysis by, while the executable code is being executed, tracking the one or more objects identified during the static analysis to determine whether the executable code leaks sensitive data via the one or more objects. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于组合静态和动态代码分析的计算机实现的方法可以包括1)识别待分析的可执行代码以确定可执行代码是否能够泄漏敏感数据,2)执行可执行代码的静态分析以识别一个 或更多的可执行代码可用于传送敏感数据的对象,通过分析可执行代码而不执行可执行代码来执行静态分析; 3)使用静态分析的结果来调整动态分析以跟踪一个或多个 在静态分析期间识别的对象,以及4)在执行可执行代码的同时执行动态分析,跟踪在静态分析期间识别的一个或多个对象,以确定可执行代码是否经由一个或多个对象泄漏敏感数据 。 还公开了各种其它方法,系统和计算机可读介质。

    Systems and methods for detecting malware
    2.
    发明授权
    Systems and methods for detecting malware 有权
    用于检测恶意软件的系统和方法

    公开(公告)号:US08726386B1

    公开(公告)日:2014-05-13

    申请号:US13422702

    申请日:2012-03-16

    IPC分类号: G06F11/00

    摘要: A computer-implemented method for detecting malware may include 1) identifying an application configured to use a permission on a mobile computing platform, the permission enabling the application to access a feature of the mobile computing platform, 2) determining that the application is configured to use the permission while executing as a background application on the mobile computing platform, 3) determining that the use of the permission is suspect based on the application being configured to use the permission while executing as the background application, and 4) performing a remediation action in response to determining that the use of the permission is suspect. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于检测恶意软件的计算机实现的方法可以包括:1)识别配置为在移动计算平台上使用许可的应用,允许应用访问移动计算平台的特征的许可,2)确定应用被配置为 在所述移动计算平台上作为后台应用程序执行时,使用所述权限; 3)根据所述应用被配置为在执行所述后台应用时使用所述权限,确定所述权限的使用是可疑的,以及4)执行修复动作 以确定使用权限是可疑的。 还公开了各种其它方法,系统和计算机可读介质。

    Systems and methods for using social-networking accounts to identify characteristics that strangers share in common
    3.
    发明授权
    Systems and methods for using social-networking accounts to identify characteristics that strangers share in common 有权
    使用社交网络帐户来识别陌生人共享的特征的系统和方法

    公开(公告)号:US09396498B1

    公开(公告)日:2016-07-19

    申请号:US13302753

    申请日:2011-11-22

    IPC分类号: G06F15/16 G06Q50/00 H04L12/58

    CPC分类号: G06Q50/01 H04L51/20 H04L51/32

    摘要: A computer-implemented method may include facilitating registration for a service capable of determining whether strangers who come in contact with one another share one or more characteristics in common. The computer-implemented method may also include obtaining, as part of the registration for the service, permission for the service to access at least a portion of one or more social-networking accounts associated with each of the strangers. The computer-implemented method may further include determining, subsequent to the registration for the service, that the strangers registered for the service have come in contact with one another and then providing the service to the strangers in response to this determination. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 计算机实现的方法可以包括便于对能够确定彼此接触的陌生人是否共享一个或多个特征的服务的服务的注册。 计算机实现的方法还可以包括获得服务的注册的一部分,该服务允许访问与每个陌生人相关联的一个或多个社交网络帐户的至少一部分。 计算机实现的方法还可以包括在服务注册之后确定为服务注册的陌生人彼此接触,然后响应于该确定向陌生人提供服务。 还公开了各种其它方法,系统和计算机可读介质。

    Systems and methods for dynamically modifying rules for selecting suitable mobile networks
    4.
    发明授权
    Systems and methods for dynamically modifying rules for selecting suitable mobile networks 有权
    用于动态修改规则以选择合适的移动网络的系统和方法

    公开(公告)号:US09107147B1

    公开(公告)日:2015-08-11

    申请号:US13493569

    申请日:2012-06-11

    IPC分类号: H04W72/00 H04W48/18

    CPC分类号: H04W48/18 H04W24/02

    摘要: A computer-implemented method for dynamically modifying rules for selecting suitable mobile networks. The method may include (1) identifying a set of predefined rules for selecting suitable mobile networks with which to connect, (2) obtaining a training data set that includes data about at least one candidate mobile network, (3) using machine learning to dynamically adjust, based at least in part on the training data set, the set of predefined rules, and (4) connecting to a suitable mobile network identified by the dynamically adjusted set of predefined rules. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 一种用于动态修改选择合适的移动网络的规则的计算机实现的方法。 该方法可以包括(1)识别用于选择与之连接的合适移动网络的一组预定义规则,(2)获得包括关于至少一个候选移动网络的数据的训练数据集,(3)使用机器学习来动态地 至少部分地基于训练数据集,预定义规则的集合进行调整,以及(4)连接到由动态调整的预定规则集合识别的合适的移动网络。 还公开了各种其它方法,系统和计算机可读介质。

    Systems and methods for identifying the spreading of sensitive data by a suspicious application
    5.
    发明授权
    Systems and methods for identifying the spreading of sensitive data by a suspicious application 有权
    用于识别可疑应用程序传播敏感数据的系统和方法

    公开(公告)号:US08474046B1

    公开(公告)日:2013-06-25

    申请号:US13188346

    申请日:2011-07-21

    IPC分类号: G06F11/00

    摘要: A computer-implemented method to identify the spreading of sensitive data from a suspicious application is described. At least one security attribute for an application programming interface (API) is defined. Sensitive data passed through the at least one security attribute to the suspicious application are marked. The marked sensitive data being passed through the at least one security attribute from the suspicious application are detected. A notification is generated regarding the spreading of the sensitive data by the suspicious application.

    摘要翻译: 描述了从可疑应用程序中识别敏感数据的扩展的计算机实现的方法。 定义了应用程序编程接口(API)的至少一个安全属性。 通过至少一个安全属性传递到可疑应用程序的敏感数据被标记。 检测到通过来自可疑应用的至少一个安全属性的标记的敏感数据。 产生关于可疑应用对敏感数据的扩展的通知。

    Systems and methods for identifying new words from a meta tag
    6.
    发明授权
    Systems and methods for identifying new words from a meta tag 有权
    从元标识中识别新单词的系统和方法

    公开(公告)号:US08892584B1

    公开(公告)日:2014-11-18

    申请号:US13073694

    申请日:2011-03-28

    IPC分类号: G06F17/30 G06F17/27

    摘要: A computer-implemented method to identify new words from a meta tag is described. A Hyper-Text Markup Language (HTML) page is analyzed to identify a meta tag associated with the HTML page. At least one separator included in content of the meta tag is identified. The content of the meta tag is divided using the identified separator. A portion of the divided content is compared to content stored in a database. Upon determining that the portion of the divided content does not exist in the database, the portion of the divided content is added to the database.

    摘要翻译: 描述了用于从元标签识别新单词的计算机实现的方法。 分析超文本标记语言(HTML)页面以识别与HTML页面相关联的元标记。 识别包含在元标签内容中的至少一个分隔符。 元标记的内容使用标识的分隔符进行分割。 将分割的内容的一部分与存储在数据库中的内容进行比较。 在确定分割内容的部分不存在于数据库中时,将分割的内容的部分添加到数据库。

    Systems and methods for monitoring application resource usage on mobile computing systems
    7.
    发明授权
    Systems and methods for monitoring application resource usage on mobile computing systems 有权
    监控移动计算系统上的应用资源使用的系统和方法

    公开(公告)号:US09118520B1

    公开(公告)日:2015-08-25

    申请号:US13452719

    申请日:2012-04-20

    摘要: A computer-implemented method for monitoring application resource usage on mobile computing systems may include 1) identifying a mobile computing system that is configured to execute one application at a time as a foreground application, 2) identifying a request to determine a resource consumption level of an application on the mobile computing system, 3) identifying, in response to the request, at least one frequency level at which a processor of the mobile computing system operates while the application executes as the foreground application, and 4) determining, based on the identified frequency level, the resource consumption level of the application. Various other methods, systems, and computer-readable media are also disclosed.

    摘要翻译: 用于监视移动计算系统上的应用资源使用的计算机实现的方法可以包括:1)识别被配置为一次作为前台应用执行一个应用的移动计算系统,2)识别确定资源消耗水平的请求 移动计算系统上的应用,3)响应于所述请求,识别所述移动计算系统的处理器在应用程序作为前台应用程序执行时运行的至少一个频率级别,以及4)基于 识别频率级别,应用程序的资源消耗水平。 还公开了各种其它方法,系统和计算机可读介质。