The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.04 - July/August (2007 vol.5)
pp: 52-56
Michael Franz , University of California, Irvine
ABSTRACT
Security vulnerabilities in software systems are a rapidly growing threat in an increasingly networked world. Unfortunately, many systems are now so complex that high-assurance auditing for errors would be prohibitively expensive. This article shows how some of the potential risks could be contained through security management at the base of the software stack, rather than inside application programs.
INDEX TERMS
trojan horse, vulnerability, security, networks
CITATION
Michael Franz, "Containing the Ultimate Trojan Horse", IEEE Security & Privacy, vol.5, no. 4, pp. 52-56, July/August 2007, doi:10.1109/MSP.2007.77
29 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool