To access: Get File: Application Isolation Containment
Abstract: Given that writing fully secure code remains an elusive goal, other techniques such as isolating processes to limit the adverse effect of a compromise are promising. This talk will summarize some of the techniques, both integrated into the operating system and available as third party add-ons, to provide this isolation.
Date Published: 18 November 2016
Last Reviewed: 20 October 2016
Dissemination Control: N/A
Length: 17 page(s)