| CPC G06F 21/577 (2013.01) [G06F 21/51 (2013.01); G06F 21/552 (2013.01); G06F 21/604 (2013.01)] | 20 Claims |

|
1. A computer-implemented method for managing loading of sensitive modules, comprising:
based on an application attempting to access a module, scanning the module to obtain module attributes;
generating a sensitivity level of the module based on the module attributes;
analyzing a computing environment of the application to generate a trust level associated with the application;
determining whether to prevent access to the module by the application based on the sensitivity level and the trust level;
when the determination is to prevent access, blocking access to the module, otherwise when the determination is to not prevent access:
determining whether to monitor the application attempting to access the module;
when the determination is to monitor the application:
analyzing activity of the application;
determining whether to terminate the application based on the analyzed activity of the application, wherein the analyzed activity of the application indicates suspicious activity;
when the determination is to terminate the application, terminating the application, otherwise permitting the application to continue execution.
|