Sciweavers

78 search results - page 1 / 16
» A Secure Jailing System for Confining Untrusted Applications
Sort
View
SECRYPT
2007
77views Business» more  SECRYPT 2007»
13 years 6 months ago
A Secure Jailing System for Confining Untrusted Applications
Guido van 't Noordende, Ádám Balogh,...
NDSS
2000
IEEE
13 years 8 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
JFP
2006
88views more  JFP 2006»
13 years 5 months ago
Type-based confinement
Confinement properties impose a structure on object graphs which can be used to enforce encapsulation properties. From a practical point of view, encapsulation is essential for bu...
Tian Zhao, Jens Palsberg, Jan Vitek
CL
2010
Springer
13 years 5 months ago
Isolating untrusted software extensions by custom scoping rules
In a modern programming language, scoping rules determine the visibility of names in various regions of a program [15]. In this work, we examine the idea of allowing an applicatio...
Philip W. L. Fong, Simon A. Orr
USENIX
2008
13 years 7 months ago
Vx32: Lightweight User-level Sandboxing on the x86
Code sandboxing is useful for many purposes, but most sandboxing techniques require kernel modifications, do not completely isolate guest code, or incur substantial performance co...
Bryan Ford, Russ Cox