A Secure Environment for Untrusted Helper Applications -- Confining the Wily Hacker

by Ian Goldberg , David Wagner , Randi Thomas , Eric A. Brewer
Citations:437 - 7 self

Documents Related by Co-Citation

590 A Sense of Self for Unix Processes – Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff - 1996
648 Exokernel: An Operating System Architecture for Application-Level Resource Management – Dawson R. Engler, M. Frans Kaashoek, James O’toole - 1995
511 StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks – Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang - 1998
682 The Protection of Information in Computer Systems – Jerome H. Saltzer, Michael D. Schroeder - 1975
761 Bro: A System for Detecting Network Intruders in Real-Time – Vern Paxson - 1999
860 Scale and performance in a distributed file system – John H. Howard, Michael L. Kazar, Sherri G. Menees, A. Nichols, M. Satyanarayanan, Robert N. Sidebotham, Michael J. West - 1988
429 A Note on the Confinement Problem – Butler W. Lampson - 1973
599 A Survey of Rollback-Recovery Protocols in Message-Passing Systems – E. N. ( Mootaz) Elnozahy, Lorenzo Alvisi, Yi-min Wang, David B. Johnson - 1996
585 A Lattice Model of Secure Information Flow – Dorothy E. Denning - 1976