FIELD: information technology.
SUBSTANCE: method of files scenario implementation in security systems operating in "prohibition by default" mode, in which safety container is made, using which, security application limits interpreter actions according to certain policies limiting interpreter actions; safety container is adapted by safety application under script files execution environment, thus changing interpreter actions policy limiting; verifying trusted script file; launching file execution scenario by interpreter as per results of positive verification for trust, at that execution is limited by safety container; intercepted at least one interpreter action when executing script file; analysing compliance of intercepted interpreter action by at least one interpreter action limiting policy defined for security container; interpreter is actuated based on analysis according to at least one limiting policy defined for safety container.
EFFECT: higher safety of computer system when executing script files by interpreters.
3 cl, 4 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF CONTROLLING APPLICATIONS | 2015 |
|
RU2587424C1 |
HARDWARE VIRTUALIZED ISOLATION FOR ENSURING SECURITY | 2017 |
|
RU2755880C2 |
SYSTEM AND METHOD OF OPENING FILES CREATED BY VULNERABLE APPLICATIONS | 2015 |
|
RU2606883C2 |
SYSTEM AND METHOD OF SETTING UP COMPUTER SYSTEM ACCORDING TO SECURITY POLICY | 2014 |
|
RU2573782C1 |
SYSTEM AND METHOD OF CONTROLLING ACCESS TO APPLICATION DATA FOR ISOLATING DATA OF ONE APPLICATION FROM DATA OF ANOTHER APPLICATION | 2023 |
|
RU2816864C1 |
SYSTEM AND METHOD OF DETECTING MALICIOUS SCRIPT | 2017 |
|
RU2659738C1 |
METHOD OF COMPOSITE FILE ACCESS CONTROL | 2017 |
|
RU2659739C1 |
METHOD FOR AUTOMATIC ADJUSTMENT OF SECURITY MEANS | 2012 |
|
RU2514137C1 |
SYSTEM AND METHOD OF DETECTING THE HARMFUL CODE IN THE ADDRESS PROCESS SPACE | 2017 |
|
RU2665910C1 |
METHOD FOR DETERMINING SIMILARITY OF COMPOSITE FILES | 2016 |
|
RU2628922C1 |
Authors
Dates
2016-05-20—Published
2014-12-19—Filed