This document discusses various defense methods against computer viruses and malware:
- Sandboxing creates a virtual environment to restrict program rights and access.
- Proof-carrying code allows validating that software meets a safety policy before execution.
- Information flow matrices aim to limit how far a virus can spread by tagging information and limiting sharing.
- Reducing protection domains applies least privilege to remove unnecessary rights from processes.
- Detecting file alteration monitors files for unauthorized changes using digital signatures.
- The notion of trust relies on users and authentication to properly limit access based on identity.