A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software

A Sadeghi, H Bagheri, J Garcia… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …

Methods, systems, and devices for dynamically modeling and grouping endpoints for edge networking

T Weingarten, A Cohen - US Patent 10,462,171, 2019 - Google Patents
Various embodiments described herein disclose an endpoint modeling and grouping
management system that can collect data from endpoint computer devices in a network. In …

Method of malware detection and system thereof

T Weingarten, A Cohen, U Shamir, K Motil - US Patent 9,710,648, 2017 - Google Patents
In accordance with an aspect of the presently disclosed Subject matter, there is provided a
computer-implemented method of detecting malware in real time in a live environ ment, the …

Method of remediating a program and system thereof by undoing operations

A Cohen, T Weingarten, S Salem, N Izraeli… - US Patent …, 2018 - Google Patents
There is provided a system and a computerized method of remediating a given program
running in an operating system, the method comprising: querying a stateful model to retrieve …

Method of remediating operations performed by a program and system thereof

A Cohen, T Weingarten, S Salem, N Izraeli… - US Patent …, 2019 - Google Patents
There is provided a system and a computerized method of remediating one or more
operations linked to a given program running in an operating system, the method …

Detection of repackaged mobile applications through a collaborative approach

A Aldini, F Martinelli, A Saracino… - Concurrency and …, 2015 - Wiley Online Library
Repackaged applications are based on genuine applications, but they subtlety include
some modifications. In particular, trojanized applications are one of the most dangerous …

MiMaLo: Advanced Normalization Method for Mobile Malware Detection

SB Sahrin, AM Faizal, N Suryana… - International Journal of …, 2022 - mecs-press.org
A range of research procedures have been executed to overcome malware attacks. This
research used a malware behavior observe approach on device calls on mobile devices …

Method of remediating operations performed by a program and system thereof

A Cohen, T Weingarten, S Salem, N Izraeli… - US Patent …, 2022 - Google Patents
There is provided a method for generating a representation for behavior similarity
comparison by generating a program level stateful model of one or more entities in a …

Systems and methods for executable code detection, automatic feature extraction and position independent code detection

S Salem, R Ronen, A Nativ, A Zohar, G Braun… - US Patent …, 2023 - Google Patents
2022-12-27 Assigned to Sentinel Labs Israel Ltd. reassignment Sentinel Labs Israel Ltd.
ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors …

The demon is in the configuration: Revisiting hybrid mobile apps configuration model

A AlJarrah, M Shehab - … of the 12th International Conference on …, 2017 - dl.acm.org
HTML-5 hybrid apps have the potential to dominate the mobile and IoTs market as hybrid
platforms are providing a promising development choice. This approach" wraps" standard …