FIELD: information technology.
SUBSTANCE: invention relates to computer security. Method of opening files created by vulnerable applications, in which: a) determined is a file creation by a source application; b) determined is at least one vulnerability in the source application; c) determined are parameters of the created file; d) determined is a file access policy depending on information determined at stages b), c); e) intercepted is opening the created file by a user application, herewith the said user application is intended to open the file; f) determined is the user application running policy; g) determined is at least one policy of opening the file by the user application depending on: the file access policy; user application running policy; h) performed is opening of the file created by the user application in accordance with the opening policy.
EFFECT: technical result is improvement of a computer protection from using by malware the computer applications vulnerabilities by opening files created by vulnerable applications in compliance with files opening policy, which depends on the file access policy and the user application running policy.
43 cl, 3 dwg, 2 tbl
Title | Year | Author | Number |
---|---|---|---|
METHOD OF PROVIDING SAFE EXECUTION OF SCRIPT FILE | 2014 |
|
RU2584507C1 |
DATA ACCESS CONTROL SYSTEM AND METHOD | 2021 |
|
RU2790338C1 |
SYSTEM AND METHOD FOR DETERMINING THE FILE TRUST LEVEL | 2019 |
|
RU2750628C2 |
NETWORK GATEWAY AND METHOD FOR TRANSFERRING DATA FROM A FIRST NETWORK TO A SECOND NETWORK | 2021 |
|
RU2770458C1 |
SYSTEM AND METHOD FOR DETECTING MALWARE BY CREATING ISOLATED ENVIRONMENT | 2012 |
|
RU2535175C2 |
SYSTEM AND METHOD OF IMPROVING ORGANISATION DATA SECURITY BY CREATING ISOLATED ENVIRONMENT | 2012 |
|
RU2541895C2 |
SYSTEM AND METHOD OF DETECTING MALICIOUS FILES OF CERTAIN TYPE | 2014 |
|
RU2583712C2 |
AUTOMATION ARCHITECTURE OF AUTOMATED SYSTEMS | 2015 |
|
RU2714726C2 |
SYSTEM AND METHOD OF DETECTING DIRECTED ATTACK ON CORPORATE INFRASTRUCTURE | 2013 |
|
RU2587426C2 |
SYSTEM AND METHOD OF DETERMINING TRUST WHEN UPDATING LICENSED SOFTWARE | 2012 |
|
RU2495487C1 |
Authors
Dates
2017-01-10—Published
2015-03-31—Filed