Second,the Virtual Ghost VM provides an instruction for generating random numbers. The random number generator is built into the Virtual Ghost VM and can be trusted by applications for generating random numbers.This defeats I ago attacks that feed non-random numbers to applications [10]. While these protections are far from comprehensive,they offer protection against existing system service attacks.