2001 Articles
Computer Security—An End State?
Over the last several years, popular applications such as Microsoft Internet Explorer and Netscape Navigator have become prime targets of attacks. These applications are targeted because their function is to process unauthenticated network data that often carry active content. The processing is done either by helper applications, or by the web browser itself. In both cases the software is often too complex to be bug free. To make matters worse, the underlying operating system can do very little to protect the users against such attacks since the software is running with the user's privileges.
Subjects
Files
- acm-predict.pdf application/pdf 17.8 KB Download File
Also Published In
More About This Work
- Academic Units
- Computer Science
- Published Here
- June 24, 2010
Notes
Communications of the ACM, vol. 44, no. 3 (March 2001), pp. 131-132.