Attack prevention
It helps to reduce the attack surface of specific applications
Applications run with the minimum possible set of privileges for a given purpose.
Least privilege principle.
Any attack that compromises an application to behave differently from the expected has a high probability of being detected and blocked.
e.g. execution of other binary files.
Ideal for preventing zero-day attacks.
The application’s hidden behaviours may be detected and blocked when triggered.
e.g. Trojan Horses.
Last updated