Improving Host Security with System Call Policies (2002)

by Niels Provos
Venue:In Proceedings of the 12th Usenix Security Symposium
Citations:268 - 0 self

Active Bibliography

4 FUNCTIONALITY-BASED APPLICATION CONFINEMENT: Parameterised Hierarchical Application Restrictions – Z. Cliffe Schreuders, Christian Payne
1 Enforcing Application-level Security in Modern Operating Systems – Richard J. Dunn
1 Sub-Identities: Toward Operating System Support for Distributed System Security – Phil Snowberger, Douglas Thain
Process Firewalls: Protecting Processes During Resource Access – Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger
The State of the Art of Application Restrictions and Sandboxes: A Survey of Application-oriented Access Controls and their Shortfalls – Z. Cliffe Schreuders, Tanya Mcgill, Christian Payne, Z. Cliffe Schreuders A, Tanya Mcgill B, Christian Payne B - 2012
59 LOMAC: Low Water-Mark Integrity Protection for COTS Environments – Timothy Fraser - 2000
17 Integrated Innate and Adaptive Artificial Immune Systems Applied to Process Anomaly Detection – Jamie Paul Twycross - 2007
73 Ostia: A Delegating Architecture for Secure System Call Interposition – Tal Garfinkel , Ben Pfaff, Mendel Rosenblum - 2003
130 Hardening COTS Software with Generic Software Wrappers – Lee Badger, Mark Feldman, Glenwood Md - 1999
1 Paladin: Helping programs help themselves with system call interposition. In anonymized review, copies available on request – Jeffrey A. Vaughan, Andrew D. Hilton - 2008
36 Vx32: Lightweight userlevel sandboxing on the x86 – Bryan Ford, Russ Cox - 2008
9 Recursive Sandboxes: Extending Systrace to Empower Applications – Aleksey Kurchuk, Angelos D. Keromytis - 2004
8 Authenticated System Calls – Mohan Rajagopalan, Matti Hiltunen, Trevor Jim, Richard Schlichting - 2005
USENIX Association – Fast Nd Usenix, Nimrod Megiddo, Dharmendra S. Modha - 2004
LOMAC: MAC you can . . . – Timothy Fraser, et al. - 2001
Secure Systems – Patrick Klinkoff, Christopher Kruegel, Giovanni Vigna
109 Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools – Tal Garfinkel - 2003
1 Coordinating Access to Computation and Data in Distributed Systems – Douglas L. Thain - 2004