Adam Sedgewick, Murugiah Souppaya, Karen Scarfone & Larry Feldman, Stopping Malware and Unauthorized Software Through Application Whitelisting (ITL Bulletin) (Dec. 2015) (full-text).
Application whitelisting technologies control which applications may be installed or executed on a computer. These technologies are most often used to detect and stop the execution of malware and other unauthorized software. Malware infections are frequently used to steal sensitive information from a user or an organization, and to tamper with the integrity and availability of computing systems. Unauthorized software can pose multiple problems. NIST Special Publication 800-167, Guide to Application Whitelisting, explains the basics of application whitelisting technologies and shows organizations how they can plan for, implement, and use these technologies successfully.