Solving least privilege security problems using virtual machines