Safe Email, Safe Office, and Safe Web Browser

نویسنده

  • Robert Balzer
چکیده

Security wrappers for Windows NT/2000 encapsulate program execution to monitor their run-time behavior and ensure that they don't do anything harmful. Wrappers have be developed to ensure that email attachments can be safely opened, that web content can be safely viewed, downloaded, and executed, and that active content in office documents can be safely executed. The wrappers can be directed to allow the execution of operations that violate security rules to safely continue by virtualizing their operation so that the effects are contained within the executing process and are not visible to any other process. This ensures that processes run within their prescribed security policy (relative to the real resources protected by that security policy) without user intervention or control. Violations of that security policy are automatically and transparently contained without user involvement or knowledge. This fully autonomic safety policy eliminates the configuration problem that has plagued existing behavior monitoring systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Browser Blacklists: The Utopia of Phishing Protection

Mobile devices especially smartphones have gained widespread adoption in recent years, due to the plethora of features they offer. The use of such devices for web browsing, accessing email services and social networking is also getting continuously more popular. The same holds true for other more sensitive online activities, such as online shopping, contactless payments, and web banking. Howeve...

متن کامل

Architectural Principles for Safe Web Programs

Web content is migrating away from simple hyperlinked documents towards a diverse set of programs that execute within the web browser. Unfortunately, modern browsers do not provide a safe environment for running these web programs. In this paper, we show how current web security threats are symptoms of four key problems in supporting web programs: vague program boundaries, unwanted code, poor i...

متن کامل

WYSISNWIV: What You Scan Is Not What I Visit

A variety of attacks, including remote-code execution exploits, malware, and phishing, are delivered to users over the web. Users are lured to malicious websites in various ways, including through spam delivered over email and instant messages, and by links injected in search engines and popular benign websites. In response to such attacks, many initiatives, such as Google’s Safe Browsing, are ...

متن کامل

Safe and Secure Places to Live, Learn, and Play

Office of Adolescent Health | Website: http://www.hhs.gov/ash/oah/TAG Twitter: @TeenHealthGov Email: [email protected] “Schools, neighborhoods, and community settings can foster and support healthy adolescent development across the spectrum, including physical and mental health, social interactions, and cognitive growth. Adolescents also benefit from safe places to congregate, enjoy social, athle...

متن کامل

Experience Report: Developing the Servo Web Browser Engine using Rust

All modern web browsers — Internet Explorer, Firefox, Chrome, Opera, and Safari — have a core rendering engine written in C++. This language choice was made because it affords the systems programmer complete control of the underlying hardware features and memory in use, and it provides a transparent compilation model. Servo is a project started at Mozilla Research to build a new web browser eng...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003