Sciweavers

124 search results - page 5 / 25
» A Module System for Isolating Untrusted Software Extensions
Sort
View
CCS
2008
ACM
14 years 11 months ago
Efficient and extensible security enforcement using dynamic data flow analysis
Current taint tracking systems suffer from high overhead and a lack of generality. In this paper, we solve both of these issues with an extensible system that is an order of magni...
Walter Chang, Brandon Streiff, Calvin Lin
PLDI
2011
ACM
14 years 12 days ago
Language-independent sandboxing of just-in-time compilation and self-modifying code
When dealing with dynamic, untrusted content, such as on the Web, software behavior must be sandboxed, typically through use of a language like JavaScript. However, even for such ...
Jason Ansel, Petr Marchenko, Úlfar Erlingss...
IWAN
2004
Springer
15 years 2 months ago
Distributed Instrusion Prevention in Active and Extensible Networks
The proliferation of computer viruses and Internet worms has had a major impact on the Internet Community. Cleanup and control of malicious software (malware) has become a key prob...
Todd S. Sproull, John W. Lockwood
ICSR
2004
Springer
15 years 3 months ago
Framed Aspects: Supporting Variability and Configurability for AOP
Aspect oriented programming (AOP) seeks to decompose concerns which crosscut system structure into more manageable modules. However, current AOP techniques alone lack the configura...
Neil Loughran, Awais Rashid
72
Voted
AIS
2004
Springer
15 years 3 months ago
Proposal of High Level Architecture Extension
The paper proposes three dimensional extension to High Level ARchitecture (HLA) and Runtime Infrastructure (RTI) to solve several issues such as security, information hiding proble...
Jae-Hyun Kim, Tag Gon Kim