Issue No. 04 - July/August (2007 vol. 5)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2007.77
Michael Franz , University of California, Irvine
Security vulnerabilities in software systems are a rapidly growing threat in an increasingly networked world. Unfortunately, many systems are now so complex that high-assurance auditing for errors would be prohibitively expensive. This article shows how some of the potential risks could be contained through security management at the base of the software stack, rather than inside application programs.
trojan horse, vulnerability, security, networks
M. Franz, "Containing the Ultimate Trojan Horse," in IEEE Security & Privacy, vol. 5, no. , pp. 52-56, 2007.