Application Containment: How to Use Ringfencing to Prevent Weaponization of Trusted Software