A Secure Environment for Untrusted Helper Applications -- Confining the Wily Hacker

by Ian Goldberg , David Wagner , Randi Thomas , Eric A. Brewer
Citations:375 - 7 self

Documents Related by Co-Citation

530 A Sense of Self for Unix Processes – Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff - 1996
116 Automated Detection of Vulnerabilities in Privileged Programs by Execution Monitoring – Calvin Ko, George Fink, Karl Levitt - 1994
87 SLIC: An extensibility system for commodity operating systems – Douglas P. Ghormley, David Petrou, Thomas E. Anderson, Steven H. Rodrigues
211 Hypervisor-based fault tolerance – Thomas C. Bressoud, Fred B. Schneider - 1995
396 A Note on the Confinement Problem – Butler W. Lampson - 1973
122 USTAT: A Real-time Intrusion Detection System for UNIX – Koral Ilgun - 1992
39 Consh: Confined Execution Environment for Internet Computations – Albert Alexandrov, Paul Kmiec, Klaus Schauser - 1999
168 Transparent Run-Time Defense Against Stack Smashing Attacks – Arash Baratloo, Navjot Singh, Timothy Tsai - 2000
262 Secure Execution Via Program Shepherding – Vladimir Kiriansky , Derek Bruening, Saman Amarasinghe - 2002
162 Interposition Agents: Transparently Interposing User Code at the System Interface – Michael B. Jones
55 Confining Root Programs with Domain and Type Enforcement (DTE – K M Walker, D F Sterne, M L Badger, M J Petkac, D L Sherman an K A Oostendorp - 1996
132 FormatGuard: Automatic Protection From printf Format String Vulnerabilities – Crispin Cowan, Matt Barringer, Steve Beattie, Greg Kroah-hartman, Mike Frantzen, Jamie Lokier - 2001
467 StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks – Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang - 1998
127 Hardening COTS Software with Generic Software Wrappers – Lee Badger, Mark Feldman, Glenwood Md - 1999
267 Improving Host Security with System Call Policies – Niels Provos - 2002
77 MAPbox: Using Parameterized Behavior Classes to Confine Applications – Anurag Acharya, Mandar Raje, Ar Raje - 2000
618 The Protection of Information in Computer Systems – Jerome H. Saltzer, Michael D. Schroeder - 1975
686 Bro: A System for Detecting Network Intruders in Real-Time – Vern Paxson - 1999
210 Survey of Virtual Machine Research – Robert R Goldberg - 1974