Sciweavers

124 search results - page 2 / 25
» A Module System for Isolating Untrusted Software Extensions
Sort
View
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
13 years 12 months ago
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native Client aims to give browser-based applications the...
Bennet Yee, David Sehr, Gregory Dardyk, J. Bradley...
SOSP
2005
ACM
14 years 2 months ago
Mondrix: memory isolation for linux using mondriaan memory protection
This paper presents the design and an evaluation of Mondrix, a version of the Linux kernel with Mondriaan Memory Protection (MMP). MMP is a combination of hardware and software th...
Emmett Witchel, Junghwan Rhee, Krste Asanovic
LISA
2008
13 years 7 months ago
Authentication on Untrusted Remote Hosts with Public-Key Sudo
Two common tools in Linux- and UNIX-based environments are SSH for secure communications and sudo for performing administrative tasks. These are independent programs with substant...
Matthew Burnside, Mack Lu, Angelos D. Keromytis
ACSAC
2002
IEEE
13 years 10 months ago
Safe Virtual Execution Using Software Dynamic Translation
Safe virtual execution (SVE) allows a host computer system to reduce the risks associated with running untrusted programs. SVE prevents untrusted programs from directly accessing ...
Kevin Scott, Jack W. Davidson
MOBISYS
2008
ACM
13 years 7 months ago
Lightweight module isolation for sensor nodes
There is an increasing tendency in sensor networks (and related networked embedded systems) to push more complexity and `intelligence' into end-nodes. This in turn leads to a ...
Nirmal Weerasinghe, Geoff Coulson