Apparatus and method for using information on malicious application behaviors among devices
First Claim
Patent Images
1. A device for using information on malicious application behaviors, the device comprising:
- a capability-monitoring unit that monitors application capabilities;
a behavior-monitoring unit that monitors application behaviors;
an mBDL-generating unit that generates a document in a formal language specifying the application capabilities and the application behaviors; and
a controlling unit that controls execution of an application using the formal language.
1 Assignment
0 Petitions
Accused Products
Abstract
A device for using information on malicious application behaviors is provided. The device includes a capability-monitoring unit that monitors application capabilities, a behavior-monitoring unit that monitors application behaviors, an mBDL-generating unit that generates a document in a formal language specifying the application capabilities and the application behaviors, and a controlling unit that controls execution of application using the formal language.
74 Citations
19 Claims
-
1. A device for using information on malicious application behaviors, the device comprising:
-
a capability-monitoring unit that monitors application capabilities; a behavior-monitoring unit that monitors application behaviors; an mBDL-generating unit that generates a document in a formal language specifying the application capabilities and the application behaviors; and a controlling unit that controls execution of an application using the formal language. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of using information on malicious application behavior in a device, the method comprising:
-
monitoring at least one of application behaviors and application capabilities; generating a document in a formal language specifying the at least one of the monitored application capabilities and the application behaviors; and controlling execution of an application using the generated formal language. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A method of using information on malicious application behaviors in a device, the method comprising:
-
receiving data that contains a document in a formal language, which is created once an application has monitored at least one of application capabilities and application behaviors; extracting information on the at least one of the application capabilities and the application behaviors by parsing the received data; and controlling execution of an application according to the extracted information. - View Dependent Claims (16, 17, 18, 19)
-
Specification