SEALANT: SECURITY FOR END-USERS OF ANDROID VIA LIGHT-WEIGHT ANALYSIS TECHNIQUES

A system for providing increased security in a mobile operating system includes at least one mobile device and a remote computing device that is remote from the mobile device. The remote computing device receives a list of two or more applications that are currently installed or intended to be insta...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: LEE, YOUN KYU, YOODEE, PEERA, MEDVIDOVIC, NENAD, SHAHBAZIAN, ARMAN, NAM, DAYE, ZHAO, YIXUE, SAFI, GHOLAMREZA, BANG, JAE
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator LEE, YOUN KYU
YOODEE, PEERA
MEDVIDOVIC, NENAD
SHAHBAZIAN, ARMAN
NAM, DAYE
ZHAO, YIXUE
SAFI, GHOLAMREZA
BANG, JAE
description A system for providing increased security in a mobile operating system includes at least one mobile device and a remote computing device that is remote from the mobile device. The remote computing device receives a list of two or more applications that are currently installed or intended to be installed on the mobile device's operating system. The remote computing device identifies vulnerable inter-component communication (ICC) paths by analyzing files associated with each of the two or more applications. A list of the vulnerable ICC paths is stored in memory of the mobile device. The mobile processor compares the list of the vulnerable ICC paths to intents sent by the components of the two or more applications and identifies a potential unsecure intent that matches one of the list of the vulnerable ICC paths. Unsecured intents can then be blocked by the user.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2019349756A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2019349756A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2019349756A13</originalsourceid><addsrcrecordid>eNrjZPAPdnX0cfQLsVIIdnUODfIMiVRw8w9ScPVz0Q0Ndg0KVvB3U3D0cwny93RRCPN0VPDxdPcI0Q13BVFACUefyGDPYIUQV2cPP8_AUNdgHgbWtMSc4lReKM3NoOzmGuLsoZtakB-fWlyQmJyal1oSHxpsZGBoaWxiaW5q5mhoTJwqAAJoL90</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SEALANT: SECURITY FOR END-USERS OF ANDROID VIA LIGHT-WEIGHT ANALYSIS TECHNIQUES</title><source>esp@cenet</source><creator>LEE, YOUN KYU ; YOODEE, PEERA ; MEDVIDOVIC, NENAD ; SHAHBAZIAN, ARMAN ; NAM, DAYE ; ZHAO, YIXUE ; SAFI, GHOLAMREZA ; BANG, JAE</creator><creatorcontrib>LEE, YOUN KYU ; YOODEE, PEERA ; MEDVIDOVIC, NENAD ; SHAHBAZIAN, ARMAN ; NAM, DAYE ; ZHAO, YIXUE ; SAFI, GHOLAMREZA ; BANG, JAE</creatorcontrib><description>A system for providing increased security in a mobile operating system includes at least one mobile device and a remote computing device that is remote from the mobile device. The remote computing device receives a list of two or more applications that are currently installed or intended to be installed on the mobile device's operating system. The remote computing device identifies vulnerable inter-component communication (ICC) paths by analyzing files associated with each of the two or more applications. A list of the vulnerable ICC paths is stored in memory of the mobile device. The mobile processor compares the list of the vulnerable ICC paths to intents sent by the components of the two or more applications and identifies a potential unsecure intent that matches one of the list of the vulnerable ICC paths. Unsecured intents can then be blocked by the user.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2019</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20191114&amp;DB=EPODOC&amp;CC=US&amp;NR=2019349756A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20191114&amp;DB=EPODOC&amp;CC=US&amp;NR=2019349756A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>LEE, YOUN KYU</creatorcontrib><creatorcontrib>YOODEE, PEERA</creatorcontrib><creatorcontrib>MEDVIDOVIC, NENAD</creatorcontrib><creatorcontrib>SHAHBAZIAN, ARMAN</creatorcontrib><creatorcontrib>NAM, DAYE</creatorcontrib><creatorcontrib>ZHAO, YIXUE</creatorcontrib><creatorcontrib>SAFI, GHOLAMREZA</creatorcontrib><creatorcontrib>BANG, JAE</creatorcontrib><title>SEALANT: SECURITY FOR END-USERS OF ANDROID VIA LIGHT-WEIGHT ANALYSIS TECHNIQUES</title><description>A system for providing increased security in a mobile operating system includes at least one mobile device and a remote computing device that is remote from the mobile device. The remote computing device receives a list of two or more applications that are currently installed or intended to be installed on the mobile device's operating system. The remote computing device identifies vulnerable inter-component communication (ICC) paths by analyzing files associated with each of the two or more applications. A list of the vulnerable ICC paths is stored in memory of the mobile device. The mobile processor compares the list of the vulnerable ICC paths to intents sent by the components of the two or more applications and identifies a potential unsecure intent that matches one of the list of the vulnerable ICC paths. Unsecured intents can then be blocked by the user.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2019</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPAPdnX0cfQLsVIIdnUODfIMiVRw8w9ScPVz0Q0Ndg0KVvB3U3D0cwny93RRCPN0VPDxdPcI0Q13BVFACUefyGDPYIUQV2cPP8_AUNdgHgbWtMSc4lReKM3NoOzmGuLsoZtakB-fWlyQmJyal1oSHxpsZGBoaWxiaW5q5mhoTJwqAAJoL90</recordid><startdate>20191114</startdate><enddate>20191114</enddate><creator>LEE, YOUN KYU</creator><creator>YOODEE, PEERA</creator><creator>MEDVIDOVIC, NENAD</creator><creator>SHAHBAZIAN, ARMAN</creator><creator>NAM, DAYE</creator><creator>ZHAO, YIXUE</creator><creator>SAFI, GHOLAMREZA</creator><creator>BANG, JAE</creator><scope>EVB</scope></search><sort><creationdate>20191114</creationdate><title>SEALANT: SECURITY FOR END-USERS OF ANDROID VIA LIGHT-WEIGHT ANALYSIS TECHNIQUES</title><author>LEE, YOUN KYU ; YOODEE, PEERA ; MEDVIDOVIC, NENAD ; SHAHBAZIAN, ARMAN ; NAM, DAYE ; ZHAO, YIXUE ; SAFI, GHOLAMREZA ; BANG, JAE</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2019349756A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2019</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>LEE, YOUN KYU</creatorcontrib><creatorcontrib>YOODEE, PEERA</creatorcontrib><creatorcontrib>MEDVIDOVIC, NENAD</creatorcontrib><creatorcontrib>SHAHBAZIAN, ARMAN</creatorcontrib><creatorcontrib>NAM, DAYE</creatorcontrib><creatorcontrib>ZHAO, YIXUE</creatorcontrib><creatorcontrib>SAFI, GHOLAMREZA</creatorcontrib><creatorcontrib>BANG, JAE</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>LEE, YOUN KYU</au><au>YOODEE, PEERA</au><au>MEDVIDOVIC, NENAD</au><au>SHAHBAZIAN, ARMAN</au><au>NAM, DAYE</au><au>ZHAO, YIXUE</au><au>SAFI, GHOLAMREZA</au><au>BANG, JAE</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SEALANT: SECURITY FOR END-USERS OF ANDROID VIA LIGHT-WEIGHT ANALYSIS TECHNIQUES</title><date>2019-11-14</date><risdate>2019</risdate><abstract>A system for providing increased security in a mobile operating system includes at least one mobile device and a remote computing device that is remote from the mobile device. The remote computing device receives a list of two or more applications that are currently installed or intended to be installed on the mobile device's operating system. The remote computing device identifies vulnerable inter-component communication (ICC) paths by analyzing files associated with each of the two or more applications. A list of the vulnerable ICC paths is stored in memory of the mobile device. The mobile processor compares the list of the vulnerable ICC paths to intents sent by the components of the two or more applications and identifies a potential unsecure intent that matches one of the list of the vulnerable ICC paths. Unsecured intents can then be blocked by the user.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2019349756A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
WIRELESS COMMUNICATIONS NETWORKS
title SEALANT: SECURITY FOR END-USERS OF ANDROID VIA LIGHT-WEIGHT ANALYSIS TECHNIQUES
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T18%3A48%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=LEE,%20YOUN%20KYU&rft.date=2019-11-14&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2019349756A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true