Install-time security analysis of mobile applications
First Claim
1. A method for performing online security analysis, the method comprising:
- installing, using a hardware processor of a mobile device, an analysis agent on a mobile device;
the analysis agent configuring the hardware processor for monitoring the mobile device to detect an initiation of installation for a new application that is to be installed on the mobile device;
in response to the initiation of installation, the hardware processor;
quarantining, at the mobile device, a set of resources corresponding to the new application;
analyzing, at the mobile device, the set of resources to determine whether or not at least one of a potential security threat or a security misconfiguration exists, said analyzing the set of resources further comprising;
determining a set of existing applications that are already installed and running on the mobile device at a time of analysis and that interact, and further determining, at the mobile device, presence of any restraints in handling unexpected text, data or numbers rendering the new application at the mobile device unavailable to rapidly process inbound and outbound transactions on demand; and
in response to determining that the new application is unavailable on demand, generating, by the hardware processor, an alert via user interface at said mobile device for informing a user that the potential security threat or the security misconfiguration exists.
1 Assignment
0 Petitions
Accused Products
Abstract
Online security analysis is provided by installing an analysis agent on a mobile device. The analysis agent monitors the mobile device to detect an initiation of installation for a new application that is to be installed on the mobile device. In response to the initiation of installation, the analysis agent quarantines a set of resources corresponding to the new application; analyzes the set of resources to determine whether or not at least one of a potential security threat or a security misconfiguration exists; and, in response to determining that at least one of the potential security threat or the security misconfiguration exists, generates an alert for informing a user that the potential security threat or the security misconfiguration exists.
66 Citations
17 Claims
-
1. A method for performing online security analysis, the method comprising:
-
installing, using a hardware processor of a mobile device, an analysis agent on a mobile device; the analysis agent configuring the hardware processor for monitoring the mobile device to detect an initiation of installation for a new application that is to be installed on the mobile device; in response to the initiation of installation, the hardware processor; quarantining, at the mobile device, a set of resources corresponding to the new application; analyzing, at the mobile device, the set of resources to determine whether or not at least one of a potential security threat or a security misconfiguration exists, said analyzing the set of resources further comprising;
determining a set of existing applications that are already installed and running on the mobile device at a time of analysis and that interact, and further determining, at the mobile device, presence of any restraints in handling unexpected text, data or numbers rendering the new application at the mobile device unavailable to rapidly process inbound and outbound transactions on demand; andin response to determining that the new application is unavailable on demand, generating, by the hardware processor, an alert via user interface at said mobile device for informing a user that the potential security threat or the security misconfiguration exists. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer program product for performing online security analysis comprises a computer-readable storage medium having a computer-readable analysis agent program stored therein, wherein the computer-readable analysis agent program, when executed on a mobile device, causes the mobile device to perform:
-
monitoring to detect an initiation of installation for a new application that is to be installed on the mobile device; in response to the initiation of installation, the analysis agent program; quarantining, at the mobile device, a set of resources corresponding to the new application; analyzing, at the mobile device, the set of resources to determine whether or not at least one of a potential security threat or a security misconfiguration exists, said analyzing the set of resources further comprising;
determining a set of existing applications that are already installed and running on the mobile device at a time of analysis and that interact, and further determining, at the mobile device, presence of any restraints in handling unexpected text, data or numbers rendering the new application at the mobile device unavailable to rapidly process inbound and outbound transactions on demand; andin response to determining that the new application is unavailable on demand, generating an alert for informing a user that the potential security threat or the security misconfiguration exists. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. An apparatus for performing online security analysis, the apparatus comprising a processor and a memory coupled to the processor, wherein the memory comprises instructions which, when executed by the processor, cause the processor to perform:
-
installing an analysis agent on a mobile device; the analysis agent monitoring the mobile device to detect an initiation of installation for a new application that is to be installed on the mobile device; in response to the initiation of installation, the analysis agent; quarantining, at the mobile device, a set of resources corresponding to the new application; applying, at the mobile device, the analysis agent to the set of resources to determine whether or not at least one of a potential security threat or a security misconfiguration exists, said analyzing the set of resources further comprising;
determining a set of existing applications that are already installed and running on the mobile device at a time of analysis and that interact, and further determining, at the mobile device, presence of any restraints in handling unexpected text, data or numbers rendering the new application at the mobile device unavailable to rapidly process inbound and outbound transactions on demand; andin response to determining that the new application is unavailable on demand, generating an alert for informing a user that the potential security threat or the security misconfiguration exists. - View Dependent Claims (14, 15, 16, 17)
-
Specification