Abstract:
Various embodiments include systems and methods of determining whether media access control (MAC) address spoofing is present in a network by a wireless communication device. A processor of the wireless communication device may determine an anticipated coherence interval based on a beacon frame received from an access point. The processor may schedule an active scan request and may determine whether a response frame corresponding to the scheduled active request is received within the anticipated coherence interval. The processor may calculate a first correlation coefficient in response to the response frame being received within the anticipated coherence interval and may determine that MAC address spoofing is not present in the network when the first correlation coefficient is greater than a first predetermined threshold.
Abstract:
Various embodiments include methods and a memory data collection processor for performing online memory data collection for memory forensics. Various embodiments may include determining whether an operating system executing in a computing device is trustworthy. In response to determining that the operating system is not trustworthy, the memory data collection processor may collect memory data directly from volatile memory. Otherwise, the operating system to collect memory data from volatile memory. Memory data may be collected at a variable memory data collection rate determined by the memory data collection processor. The memory data collection rate may depend upon whether an available power level of the computing device exceeds a threshold power level, whether an activity state of the processor of the computing device equals a sleep state whether a security risk exists on the computing device, and whether a volume of memory traffic in the volatile memory exceeds a threshold volume.
Abstract:
A computing device may be protected from non-benign behavior, malware, and cyber attacks by using a combination of predictive and real-time behavior-based analysis techniques. A computing device may be configured to identify anticipated behaviors of a software application before runtime, analyze the anticipated behaviors before runtime to generate static analysis results, commencing execution of the software application, analyze behaviors of the software application during runtime via a behavior-based analysis system, and control operations of the behavior-based analysis system based on the static analysis results.
Abstract:
Various embodiments include methods, and computing devices implementing the methods, for analyzing sensor information to identify an abnormal vehicle behavior. A computing device may monitor sensors (e.g., a closely-integrated vehicle sensor, a loosely-integrated vehicle sensor, a non-vehicle sensor, etc.) in the vehicle to collect the sensor information, analyze the collected sensor information to generate an analysis result, and use the generated analysis result to determine whether a behavior of the vehicle is abnormal. The computing device may also generate a communication message in response to determining that the behavior of the vehicle is abnormal, and send the generated communication message to an external entity.
Abstract:
Various embodiments provide methods, devices, and non-transitory processor-readable storage media enabling network probing with a communication device based on the communication device sending a probe via a first network connection and receiving the probe via a second network connection. By leveraging a capability of a communication device to establish two network connections at the same time, various embodiments may enable a single communication device to act as both a probing client and a probing server. In this manner, various embodiments may enable standalone network probing, i.e., network probing that may not require a remote dedicated probing server to act as a probe generator or a probe sink.
Abstract:
Systems, methods, and devices of the various aspects enable identification of anomalous application behavior. A computing device processor may detect network communication activity of an application on the computing device. The processor may identify one or more device states of the computing device, and one or more categories of the application. The processor may determine whether the application is behaving anomalously based on a correlation of the detected network communication activity of the application, the identified one or more device states of the computing device, and the identified one or more categories of the application.
Abstract:
Disclosed are methods, devices, systems, apparatus, servers, computer- / processor-readable media, and other implementations, including a method, performed at a processor-based device, that includes obtaining antenna information for one or more wireless nodes, and generating based, at least in part, on the antenna information for the one or more wireless nodes, a heatmap representative of values measurable at a plurality of locations from signals transmitted by the one or more wireless nodes.
Abstract:
Methods and apparatus for processing positioning data are provided. In an example, a method for processing positioning data associated with one or more access points includes choosing, for inclusion in the positioning data, one or both of: (1) ranging model parameters to enable a mobile device to compute first heatmap data for multiple points in a ranging region of a heatmap, or (2) second heatmap data for a plurality of points in a non-ranging region of the heatmap. The method can also include transmitting the positioning data, such as to a mobile device. The positioning data can also include both the ranging model parameters and the second heatmap data when the ranging region and the non-ranging region fully or partially overlap, in which case the second heatmap data provides correction data to enable the mobile device to modify the computed heatmap data in the area where the two regions overlap.
Abstract:
A computing device operates to receive, from at least a first peer device, a set of metadata that includes one or more identifiers to media playback resources. The computing device operates to determine one or more filters for the set of metadata. A metadata from the set of metadata is selected based on the one or more filters. A search request is provided to a network service for a media playback resource based on the selected metadata.
Abstract:
Methods, apparatus, and techniques for provisioning geofences are disclosed. In one aspect, a map comprising one or more selectable geographic entities is displayed. In response to a selection by a user of at least one geographic entity of the one or more geographic entities, a geofence corresponding to the selected at least one geographic entity is created. In another aspect, a user may provide an input including one or more keywords. In response to determining that a first geographic entity has attributes that match the one or more keywords, a geofence corresponding to the first geographic entity is created.