Confining root programs with domain and type enforcement (DTE)

  • Authors:
  • Kenneth M. Walker;Daniel F. Sterne;M. Lee Badger;Michael J. Petkac;David L. Sherman;Karen A. Oostendorp

  • Affiliations:
  • -;-;-;-;-;-

  • Venue:
  • SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
  • Year:
  • 1996

Quantified Score

Hi-index 0.00

Visualization

Abstract

Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are ...