A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker )

@inproceedings{Goldberg1996ASE,
  title={A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker )},
  author={Ian Goldberg and David Wagner and Randi Thomas and E Thomas Brewer},
  year={1996}
}
Many popular programs, such as Netscape, use untrusted helper applications to process data from the network. Unfortunately, the unauthenticated network data they interpret could well have been created by an adversary, and the helper applications are usually too complex to be bug-free. This raises signi cant security concerns. Therefore, it is desirable to create a secure environment to contain untrusted helper applications. We propose to reduce the risk of a security breach by restricting the… CONTINUE READING
Highly Influential
This paper has highly influenced 27 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 361 citations. REVIEW CITATIONS

1 Figure or Table

Topics

Statistics

01020'97'99'01'03'05'07'09'11'13'15'17
Citations per Year

362 Citations

Semantic Scholar estimates that this publication has 362 citations based on the available data.

See our FAQ for additional information.