Sciweavers

49 search results - page 3 / 10
» Sandboxing Applications
Sort
View
PG
2003
IEEE
13 years 11 months ago
Virtual Sandbox
Interactive applications such as virtual reality systems have become popular in recent years. A ground surface composed of a granular material can be deformed when it comes into c...
Koichi Onoue, Tomoyuki Nishita
ACSAC
2006
IEEE
13 years 10 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...

Publication
148views
13 years 8 months ago
ADSandbox: sandboxing JavaScript to fight malicious websites
We present ADSandbox, an analysis system for malicious websites that focusses on detecting attacks through JavaScript. Since, in contrast to Java, JavaScript does not have any bui...
GRID
2004
Springer
13 years 11 months ago
From Sandbox to Playground: Dynamic Virtual Environments in the Grid
Much experience has been gained with the protocols and mechanisms needed for discovery and allocation of remote computational resources. However, the preparation of a remote compu...
Katarzyna Keahey, Karl Doering, Ian T. Foster
ISW
2010
Springer
13 years 4 months ago
Privilege Escalation Attacks on Android
Abstract. Android is a modern and popular software platform for smartphones. Among its predominant features is an advanced security model which is based on application-oriented man...
Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeg...