Sciweavers

49 search results - page 1 / 10
» Sandboxing Applications
Sort
View
IPPS
2005
IEEE
13 years 10 months ago
Speculative Security Checks in Sandboxing Systems
Sandboxing systems are extremely useful for secure execution of untrusted applications. Many of the sandboxing systems proposed so far provide security by intercepting system call...
Yoshihiro Oyama, Koichi Onoue, Akinori Yonezawa
USENIX
2001
13 years 6 months ago
Sandboxing Applications
Users frequently have to choose between functionality and security. When running popular Web browsers or email clients, they frequently find themselves turning off features such a...
Vassilis Prevelakis, Diomidis Spinellis
USS
2010
13 years 2 months ago
Capsicum: Practical Capabilities for UNIX
Capsicum is a lightweight operating system capability and sandbox framework planned for inclusion in FreeBSD 9. Capsicum extends, rather than replaces, UNIX APIs, providing new ke...
Robert N. M. Watson, Jonathan Anderson, Ben Laurie...
ACSAC
2006
IEEE
13 years 11 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
SEC
2004
13 years 6 months ago
Recursive Sandboxes: Extending Systrace To Empower Applications
The systrace system-call interposition mechanism has become a popular method for containing untrusted code through program-specific policies enforced by user-level daemons. We desc...
Aleksey Kurchuk, Angelos D. Keromytis