You are here
Security Escorts for Not-Yet-Trusted Software
Title: Principal Investigator
Phone: (650) 931-2700
Email: earl@stottlerhenke.com
Title: Accounting/Contracting Manager
Phone: (650) 931-2700
Email: jhworth@stottlerhenke.com
Contact: Jason Nieh
Address:
Phone: (212) 939-7160
Type: Nonprofit College or University
With the rapid release of new software applications, builds and patches for existing applications, and increased mobility of software across networks, more of our systems will run software applications that may not have a full pedigree of evaluation and testing to ensure that they are free from exploits and malware. Additionally, any previous certifications are invalidated at the first update. However, it isn’t practical to exclude critical functionality from our systems simply due to a lack of pedigree. One technique for allowing untrusted functions to run on a system is to establish a constrained environment, or sandbox, that monitors the activities of software and limits access to the rest of the system.
* Information listed above is at the time of submission. *