Building a trusted computing base
Interposition, Interception
wrapper, firewalls etc.