FIELD: physics, computer engineering.
SUBSTANCE: invention relates to information security. A method for protection from threats which use vulnerabilities in applications, which includes determining presence of at least one vulnerability in an application; in case of presence of at least one vulnerability in said application, performing analysis of said application in order to detect typical actions performed during execution of said application; generating at least one limiting rule for controlling said application in order to protect from vulnerability, where the limiting rule blocks actions performed during operation of the application, which are not typical actions for said application.
EFFECT: preventing use of vulnerabilities contained in an application by controlling the application by generating rules for limiting actions of said application.
15 cl, 5 dwg, 1 tbl
Authors
Dates
2015-11-20—Published
2013-08-07—Filed