The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Apr. 21, 2020

Filed:

Mar. 28, 2018
Applicant:

International Business Machines Corporation, Armonk, NY (US);

Inventors:

Suresh Chari, Scarsdale, NY (US);

Zhongshu Gu, Ridgewood, NJ (US);

Heqing Huang, Mahwah, NJ (US);

Xiaokui Shu, Ossining, NY (US);

Jialong Zhang, White Plains, NY (US);

Attorneys:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04M 1/66 (2006.01); H04W 12/12 (2009.01); H04W 12/08 (2009.01); G06F 21/62 (2013.01); G06F 21/53 (2013.01); G06F 9/54 (2006.01); G06F 21/55 (2013.01);
U.S. Cl.
CPC ...
H04W 12/12 (2013.01); G06F 9/54 (2013.01); G06F 21/53 (2013.01); G06F 21/554 (2013.01); G06F 21/6218 (2013.01); H04W 12/08 (2013.01); G06F 2221/2141 (2013.01);
Abstract

Advanced persistent threats to a mobile device are detected and prevented by leveraging the built-in mandatory access control (MAC) environment in the mobile operating system in a 'stateful' manner. To this end, the MAC mechanism is placed in a permissive mode of operation wherein permission denials are logged but not enforced. The mobile device security environment is augmented to include a monitoring application that is instantiated with system privileges. The application monitors application execution parameters of one or more mobile applications executing on the device. These application execution parameters including, without limitation, the permission denials, are collected and used by the monitoring application to facilitate a stateful monitoring of the operating system security environment. By assembling security-sensitive events over a time period, the system identifies an advanced persistent threat (APT) that otherwise leverages multiple steps using benign components. Once an APT has been detected, a mitigation action (e.g., terminating the malicious process) is undertaken.


Find Patent Forward Citations

Loading…