Application security analysis
First Claim
1. A method, comprising:
- evaluating each of a plurality of applications for account takeover behavior, the plurality of applications residing on a mobile device, the mobile device being configurable to access an enterprise system, the evaluating comprising;
performing an analysis of each of the plurality of applications for account takeover behavior, the account takeover behavior including accessing an account of another user, the another user being different from a user of the mobile device;
based on the analysis, calculating a score for each of the plurality of applications;
determining whether each of the plurality of applications meets or exceeds a score threshold; and
automatically remediating each of the applications, of the plurality of applications, for which the score meets or exceeds the score threshold.
4 Assignments
0 Petitions
Accused Products
Abstract
Application security analysis including systems and methods for analyzing applications for risk is provided. In an example method, the applications reside on a mobile device configurable to access an enterprise system. The example method includes evaluating each of a plurality of applications variously for privacy, data leakage, and malicious behavior. The example method also includes calculating a risk score for each of the plurality of applications based on the evaluating; and automatically remediating (e.g., quarantining) the applications, of the plurality of applications, for which the risk score meets or exceeds a risk score threshold. The method may evaluate all of the applications residing on a mobile device. The method may include grouping application behaviors, for each of the applications, that indicate an increased risk into groups comprising two or more of privacy risk, a data leakage risk, an account takeover risk, a device takeover risk, and a malware risk.
65 Citations
19 Claims
-
1. A method, comprising:
-
evaluating each of a plurality of applications for account takeover behavior, the plurality of applications residing on a mobile device, the mobile device being configurable to access an enterprise system, the evaluating comprising; performing an analysis of each of the plurality of applications for account takeover behavior, the account takeover behavior including accessing an account of another user, the another user being different from a user of the mobile device; based on the analysis, calculating a score for each of the plurality of applications; determining whether each of the plurality of applications meets or exceeds a score threshold; and automatically remediating each of the applications, of the plurality of applications, for which the score meets or exceeds the score threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A system for mobile device management, comprising:
-
one or more enterprise devices that provide enterprise services; and an application analysis system, comprising a processor that executes instructions stored in memory to; detect mobile devices attempting to access the enterprise services; and conduct an analysis of a plurality of applications residing on the mobile devices, the mobile devices being configurable to access an enterprise system, the analysis comprising; comparing the plurality of applications to a whitelist and blacklist; for each of the plurality of applications not on the whitelist or blacklist, evaluating each of the plurality of applications for account takeover behavior, the evaluating comprising performing an analysis of each of the plurality of applications for the account takeover behavior, the account takeover behavior including accessing an account of another user, the another user being different from a user of the mobile device; calculating a score for each of the plurality of applications based on the application behavior; and automatically remediating respective applications of the plurality of applications if the score calculated for the respective applications meets or exceeds a score threshold.
-
-
19. A non-transitory computer-readable storage medium having embodied thereon instructions, which, when executed by at least one processor, perform steps of a method, the method comprising:
-
evaluating each of a plurality of applications for account takeover behavior, the plurality of applications residing on a mobile device, the mobile device being configurable to access an enterprise system, the evaluating comprising; performing an analysis of each of the plurality of applications for account takeover behavior, the account takeover behavior including accessing an account of another user, the another user being different from a user of the mobile device; based on the analysis, calculating a score for each of the plurality of applications; determining whether each of the plurality of applications meets or exceeds a score threshold; and automatically remediating the applications, of the plurality of applications, for which the score meets or exceeds the score threshold.
-
Specification