Design Interactive policy generation. Generate policies for potentially malicious applications or input data. Generation of policy during program execution. Notification for every system call not covered by current policy. Policy is refined interactively to converge to good policy.