Methods and systems for identifying malware through differences in cloud vs. client behavior

US-201514667461-A
Stocking
Nationwide
Liên hệ
0x0
0 (gram)

(en)A computing device may be configured to work in conjunction with another component (e.g., a server) to better determine whether a software application is benign or non-benign. This may be accomplished via the server performing static and/or dynamic analysis operations, generating a behavior information structure that describes or characterizes the range of correct or expected behaviors of the software application, and sending the behavior information structure to a computing device. The computing device may compare the received behavior information structure to a locally generated behavior information structure to determining whether the observed behavior of the software application differs or deviates from the expected behavior of the software application or whether the observed behavior is within the range of expected behaviors. The computing device may increase its level of security/scrutiny when the behavior information structure does not match the local behavior information structure.

You are commenting for Methods and systems for identifying malware through differences in cloud vs. client behavior


You are contracting for Methods and systems for identifying malware through differences in cloud vs. client behavior


Expert Methods and systems for identifying malware through differences in cloud vs. client behavior

Full name: Đoàn Thị Kiều Oanh

VTEX2208
(+84) 982 982 604
kieuoanh.doan@gmail.com

Address : Phường Quyết Tâm, TP. Sơn La, Tỉnh Sơn La