Systems and methods for evaluating application trustworthiness
First Claim
1. A computer-implemented method for evaluating application trustworthiness, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- identifying an application subject to a security assessment;
identifying a secondary identifier used by the application to validate the application to a legitimate third-party service to which the application is configured to send a request during execution;
querying a secondary identity database with the secondary identifier for information about the secondary identifier;
determining whether the application is malicious based at least in part on the information about the secondary identifier.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for evaluating application trustworthiness may include 1) identify an application subject to a security assessment, 2) identify a secondary identifier used by the application to identify the application to a third-party service to which the application is configured to send a request during execution, 3) query a secondary identity database with the secondary identifier for information about the secondary identifier, and 4) determine whether the application is malicious based at least in part on the information about the secondary identifier. Various other methods, systems, and computer-readable media are also disclosed.
10 Citations
20 Claims
-
1. A computer-implemented method for evaluating application trustworthiness, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
identifying an application subject to a security assessment; identifying a secondary identifier used by the application to validate the application to a legitimate third-party service to which the application is configured to send a request during execution; querying a secondary identity database with the secondary identifier for information about the secondary identifier; determining whether the application is malicious based at least in part on the information about the secondary identifier. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for evaluating application trustworthiness, the system comprising:
-
an identification module programmed to identify an application subject to a security assessment; an analysis module programmed to identify a secondary identifier used by the application to validate the application to a legitimate third-party service to which the application is configured to send a request during execution; a querying module programmed to query a secondary identity database with the secondary identifier for information about the secondary identifier; a determination module programmed to determine whether the application is malicious based at least in part on the information about the secondary identifier; at least one processor configured to execute the identification module, the analysis module, the querying module, and the determination module. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium comprising one or more computer-executable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
identify an application subject to a security assessment; identify a secondary identifier used by the application to validate the application to a legitimate third-party service to which the application is configured to send a request during execution; query a secondary identity database with the secondary identifier for information about the secondary identifier; determine whether the application is malicious based at least in part on the information about the secondary identifier. - View Dependent Claims (18, 19, 20)
-
Specification