METHODS AND APPARATUS TO MONITOR PERMISSION-CONTROLLED HIDDEN SENSITIVE APPLICATION BEHAVIOR AT RUN-TIME
An apparatus for monitoring access to resources of the apparatus includes a display, a memory for storing instructions, and one or more processors configured to execute the stored instructions to grant, to an application, an access permission for a resource of the apparatus during installation of th...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | An apparatus for monitoring access to resources of the apparatus includes a display, a memory for storing instructions, and one or more processors configured to execute the stored instructions to grant, to an application, an access permission for a resource of the apparatus during installation of the application at the apparatus or during a subsequent runtime of the application. The stored instructions further causing the one or more processors to identify an access attempt by the application for the resource, the identification occurring after the access permission for the resource of the apparatus is granted to the application during the installation of the application at the apparatus or during the subsequent runtime of the application. The stored instructions further causing the one or more processors, based on the access permission granted to the application, to determine that the access attempt is related to a suspicious activity by evaluating the access attempt from the application accessing the resource of the apparatus. The stored instructions further causing the one or more processors, based on determining that the access attempt is related to the suspicious activity, to display, on the display, a graphical user interface (GUI) including a notification of the access attempt related to the suspicious activity. |
---|