nextupprevious

Basic Idea

Figures 1 and 2 show that particular user applications that "touch" or invoke potentially malicious objects no longer run with user access rights (applications do run with user access rights before invoking such objects).

Example applications: email, Web browser.

Basically any application that potentially invokes code that is received as data.