METHODS AND APPARATUS TO MONITOR PERMISSION-CONTROLLED HIDDEN SENSITIVE APPLICATION BEHAVIOR AT RUN-TIME
An apparatus for monitoring access to resources of the apparatus includes a display, a memory for storing instructions, and one or more processors configured to execute the stored instructions to grant, to an application, an access permission for a resource of the apparatus during a runtime of the a...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng ; fre ; ger |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | An apparatus for monitoring access to resources of the apparatus includes a display, a memory for storing instructions, and one or more processors configured to execute the stored instructions to grant, to an application, an access permission for a resource of the apparatus during a runtime of the application after installation of the application at the apparatus. The stored instructions further causing the one or more processors to identify an access attempt by the application for the resource, the identification occurring after the access permission for the resource of the apparatus is granted to the application during the runtime of the application after installation of the application at the apparatus. The stored instructions further causing the one or more processors to, based on the access permission granted to the application, determine that the access attempt is related to a suspicious activity by evaluating the access attempt from the application accessing the resource of the apparatus. The stored instructions further causing the one or more processors to, based on determining that the access attempt is related to the suspicious activity, display, on the display, a graphical user interface (GUI) including a notification of the access attempt related to the suspicious activity. The stored instructions further causing the one or more processors to, based on a user input, perform at least one of permitting the application to access the resource or blocking the application from accessing the resource, wherein the access permission is granted to the application. |
---|