APPLICATION WHITELISTING: SECURING SYSTEMS FROM ROGUE APPLICATIONS