×

Analyzing security of applications

  • US 9,652,617 B1
  • Filed: 06/25/2013
  • Issued: 05/16/2017
  • Est. Priority Date: 06/25/2013
  • Status: Expired due to Fees
First Claim
Patent Images

1. A non-transitory computer-readable medium having a plurality of computer instructions executable by at least one computing device, wherein, upon execution, the plurality of computer instructions cause the at least one computing device to at least:

  • identify an application in an application marketplace;

    perform an analysis of the application of a set of code fragments employed by the application and a set of device resources employed by the application;

    determine a resource consumption profile employed by the application;

    generate an application fingerprint based at least in part upon the analysis of the application, the application fingerprint comprising information about the code fragments, the set of device resources, and the resource consumption profile;

    identify a potentially malicious component of the application based at least in part upon a comparison of the application fingerprint with a plurality of other application fingerprints of a respective plurality of other applications in the application marketplace, wherein one of the plurality of other applications comprises a first application designated as a malicious application, another of the plurality of other applications comprises a second application designated as a non-malicious application;

    modify an application sandbox in which an application instance is executed to adjust a capability of the application to access a respective device resource from the set of device resources;

    generate a score based at least in part upon the application fingerprint, assigning a maliciousness designation to the application in response to the score exceeding a threshold;

    identify a related application in the application marketplace based at least in part on a comparison of the application fingerprint with the plurality of other application fingerprints of the respective plurality of other applications; and

    assign the related application the maliciousness designation in response to a determination that a respective application fingerprint of the related application indicates that the related application comprises the potentially malicious component.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×