This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Containing the Ultimate Trojan Horse
July/August 2007 (vol. 5 no. 4)
pp. 52-56
Michael Franz, University of California, Irvine
Security vulnerabilities in software systems are a rapidly growing threat in an increasingly networked world. Unfortunately, many systems are now so complex that high-assurance auditing for errors would be prohibitively expensive. This article shows how some of the potential risks could be contained through security management at the base of the software stack, rather than inside application programs.
Index Terms:
trojan horse, vulnerability, security, networks
Citation:
Michael Franz, "Containing the Ultimate Trojan Horse," IEEE Security & Privacy, vol. 5, no. 4, pp. 52-56, July-Aug. 2007, doi:10.1109/MSP.2007.77
Usage of this product signifies your acceptance of the Terms of Use.