Security issues Integrity attacks Privacy attacks Denial of Service attacks
Prevent the attacks Denied all operations that modify, read and transmit the state of the host environment Setup security policies Different level of trustiness = Different level of rights
Summary Padded Cell model in general is similar to User/Kernel space model Safe-Tcl using padded cell model to prevent integrity and privacy attacks Safe-Tcl can use security policies to regulate permissions that an applet have
Questions What is the hardest part of designing Safe-Tcl environment?
Your consent to our cookies if you continue to use this website.