Issue No.04 - July/August (2007 vol.5)
Michael Franz , University of California, Irvine
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2007.77
Security vulnerabilities in software systems are a rapidly growing threat in an increasingly networked world. Unfortunately, many systems are now so complex that high-assurance auditing for errors would be prohibitively expensive. This article shows how some of the potential risks could be contained through security management at the base of the software stack, rather than inside application programs.
trojan horse, vulnerability, security, networks
Michael Franz, "Containing the Ultimate Trojan Horse", IEEE Security & Privacy, vol.5, no. 4, pp. 52-56, July/August 2007, doi:10.1109/MSP.2007.77