Abstract: Various embodiments provide novel tools and techniques for a threat mapping engine. A system includes a vertex discovery harvester subsystem, an edge extractor subsystem, a vertex correlator subsystem, and a recursive graph builder subsystem. The recursive graph builder subsystem includes a processor, and a computer readable medium in communication with the processor, the computer readable medium having encoded thereon a set of instructions executable by the processor to generate a map of one or more connections from the first known vertex to at least one related vertex of the one or more vertices via at least one edge, based on the one or more vertex correlations, determine a threat score indicative of a threat posed by at least one related vertex of the map, and generate a threat graph based on the map and the threat score of the at least one related vertex layered over the map.
Abstract: Novel tools and techniques for concurrent media stream aggregate fingerprinting are provided. A system includes a harvester subsystem, downloader subsystem, fingerprinter subsystem, and an analyzer subsystem. The harvester subsystem is configured to identify a first address associated with a first third-party streaming platform based on stream search criteria. The downloader subsystem is configured to capture a first streaming media segment from the first address. The fingerprinter subsystem is configured to generate a first captured stream fingerprint of the first streaming media segment and generate a first source fingerprint of a source streaming media segment.
Abstract: Novel tools and techniques might provide for implementing application programming interface (“API”) use compliance, and, in some cases, by implementing application auditing for API use compliance within virtual environments in which target APIs are executed. In some embodiments, a method might comprise identifying misuse of an application programming interface (“API”) that is used in a developer channel, by intercepting data streams between the API and one or more computing systems, parsing the intercepted data streams, and determining whether the API is use non-compliant, based at least in part on identifying use non-compliant characteristics in the parsed data streams.
Abstract: Novel tools and techniques for monitoring software applications, and in particular software applications available from app stores, for apps that might infringe the intellectual property of others. Merely by way of example, a tool might identify an application in an app store, download that application, and analyze that application for content that might be infringing. Such analysis can include, but is not limited to, decompiling the application. Meta-content about the application (including portions of the content) can be compared with meta-content about other applications, to identify associations between applications. In other cases, the meta-content can be used to identify acts of intellectual property infringement.