摘要:
The various aspects provide a method for recognizing and preventing malicious behavior on a mobile computing device before it occurs by monitoring and modifying instructions pending in the mobile computing device's hardware pipeline (i.e., queued instructions). In the various aspects, a mobile computing device may preemptively determine whether executing a set of queued instructions will result in a malicious configuration given the mobile computing device's current configuration. When the mobile computing device determines that executing the queued instructions will result in a malicious configuration, the mobile computing device may stop execution of the queued instructions or take other actions to preempt the malicious behavior before the queued instructions are executed.
摘要:
Example methods, apparatuses, or articles of manufacture are disclosed herein that may be utilized, in whole or in part, to facilitate or support one or more operations or techniques for improving positioning accuracy of a mobile device with a lower positioning capability, such as, for example, via one or more proximate mobile devices with a higher positioning capability.
摘要:
Methods, systems, computer-readable media, and apparatuses for detection of anomalies within indoor map information are presented. In some embodiments, the method includes receiving a digital map. The method may further include identifying one or more anomalies within the digital map using a software-based anomaly detection tool. The method may also include displaying one or more suggested corrections to a user based on the one or more identified anomalies. The method may additionally include correcting the one or more identified anomalies within the digital map.
摘要:
Methods and systems for classifying mobile device behavior include configuring a server use a large corpus of mobile device behaviors to generate a full classifier model that includes a finite state machine suitable for conversion into boosted decision stumps and/or which describes all or many of the features relevant to determining whether a mobile device behavior is benign or contributing to the mobile device's degradation over time. A mobile device may receive the full classifier model and use the model to generate a full set of boosted decision stumps from which a more focused or lean classifier model is generated by culling the full set to a subset suitable for efficiently determining whether mobile device behavior are benign. Boosted decision stumps may be culled by selecting all boosted decision stumps that depend upon a limited set of test conditions.
摘要:
The various aspects provide a mobile device and methods implemented on the mobile device for modifying behavior models to account for device-specific or device-state-specific features. In the various aspects, a behavior analyzer module may leverage a full feature set of behavior models (i.e. a large classifier model) received from a network server to create lean classifier models for use in monitoring for malicious behavior on the mobile device, and the behavior analyzer module may dynamically modify these lean classifier models to include features specific to the mobile device and/or the mobile device's current configuration. Thus, the various aspects may enhance overall security for a particular mobile device by taking the mobile device and its current configuration into account and may improve overall performance by monitoring only features that are relevant to the mobile device.
摘要:
Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing device behaviors that are to be observed, the number of behaviors that are to be observed, and the level of detail or granularity at which the mobile device behaviors are to be observed. The various aspects efficiently identify suspicious or performance-degrading mobile device behaviors without requiring an excessive amount of processing, memory, or energy resources.
摘要:
An example method for updating a wireless signal model includes: measuring a distance from a mobile station to each wireless access point, of multiple wireless access points, based upon a wireless signal model; calculating a position of the mobile station based upon the measured distance; determining a computed distance to each wireless access point based upon the calculated position of the mobile station; updating the wireless signal model based upon the measured and computed distances to each wireless access point; and determining whether the wireless signal model has converged.
摘要:
The subject matter disclosed herein relates to systems, methods, apparatuses, devices, articles, and means for updating radio models. For certain example implementations, a method for one or more server devices may comprise receiving at one or more communication interfaces at least one measurement that corresponds to a position of a first mobile device within an indoor environment. At least one radio model that is stored in one or more memories may be updated based, at least in part, on the at least one measurement to produce at least one updated radio model. The at least one radio model and the at least one updated radio model may correspond to the indoor environment. The at least one updated radio model may be transmitted to enable a second mobile device to use the at least one updated radio model for positioning within the indoor environment. Other example implementations are described herein.
摘要:
Methods, systems and devices compute and use the execution session contexts of software applications to perform behavioral monitoring and analysis operations. A mobile device may be configured to monitor user activity and system activity of a software application, generate a shadow feature value that identifies actual execution session context of the software application during that activity, generate a behavior vector that incorporates context into the values describing behaviors, and determine whether the activity is malicious or benign based, at least in part, on the generated behavior vector. The mobile device processor may also be configured to intelligently determine whether the execution session context of a software application is relevant to determining whether any of the monitored mobile device behaviors are malicious or suspicious, and monitor only the execution session contexts of the software applications for which such determinations are relevant.
摘要:
Methods, and devices implementing the methods, use device-specific classifiers in a privacy-preserving behavioral monitoring and analysis system for crowd-sourcing of device behaviors. Diverse devices having varying degrees of “smart” capabilities may monitor operational behaviors. Gathered operational behavior information may be transmitted to a nearby device having greater processing capabilities than a respective collecting device, or may be transmitted directly to an “always on” device. The behavior information may be used to generate behavior vectors, which may be analyzed for anomalies. Vectors containing anomaly flags may be anonymized to remove any user-identifying information and subsequently transmitted to a remote recipient such as a service provider or device manufacture. In this manner, operational behavior information may be gathered about different devices from a large number of users, to obtain statistical analysis of operational behavior for specific makes and models of devices, without divulging personal information about device users.