For example,Бобцов

IMPLEMENTATION OF SANDBOX METHOD FOR POTENTIALLY MALICIOUS APPLICATIONS

Annotation

A method is proposed for sandbox implementation for potentially malicious applications including those which received malicious characteristics after infection. The method is based on redirection of access requests based on patented technical solution. The sandbox implementation method produces minimal impact on end machine productivity and is easily administrated; an example of practical interest application is presented. The described technical solution is tested in a commercial information security system.

Keywords

Articles in current issue