| CPC G06F 21/566 (2013.01) [G06F 21/554 (2013.01); G06F 21/577 (2013.01); H04L 63/20 (2013.01); H04L 63/1416 (2013.01)] | 18 Claims |

|
1. A method for securing an application comprising:
converting a set of code sources of the application to a code profile, which comprises a set of flow graphs and which characterizes controls within the set of code sources;
mapping controls of interest within the code profile by identifying sequences of controls in the set of flow graphs that are associated with detection of a potential security event;
instrumenting the application according to the code profile, wherein instrumenting comprises augmenting the execution of the controls of interest in the application to trigger tracking operations during execution of the application;
during execution of the application, tracking execution flow of the controls of interest through triggered tracking operations, and detecting a security event based at least in part on a detected sequence of execution flow associated with the security event.
|