Retaining Sandbox Containment Despite Bugs in Privileged Memory-Safe Code

by Armon Dadgar , Jeff Rasley , Justin Samuel , Ivan Beschastnikh , Cosmin Barsan , Arvind Krishnamurthy , Thomas Anderson
Citations:2 - 0 self

Active Bibliography

TxBox:BuildingSecure,EfficientSandboxeswith SystemTransactions – Suman Jana, Donald E. Porter, Vitaly Shmatikov
2011 IEEE Symposium on Security and Privacy – Txbox:buildingsecure Efficientsandboxeswith Systemtransactions, Suman Jana, Donald E. Porter, Vitaly Shmatikov
4 FUNCTIONALITY-BASED APPLICATION CONFINEMENT: Parameterised Hierarchical Application Restrictions – Z. Cliffe Schreuders, Christian Payne
A HIERARCHICAL IDENTITY MODEL FOR PRACTICAL CONTAINMENT – Philip Snowberger - 2007
183 Countering Code-Injection Attacks With Instruction-Set Randomization – Gaurav S. Kc - 2003
79 SQLrand: Preventing SQL Injection Attacks – Stephen W. Boyd, Angelos D. Keromytis - 2004
3 Operating System Virtualization: Practice and Experience – Oren Laadan, Jason Nieh - 2010
37 Vx32: Lightweight userlevel sandboxing on the x86 – Bryan Ford, Russ Cox - 2008
2008 IEEE Symposium on Security and Privacy Practical Proactive Integrity Preservation: A Basis for Malware Defense ∗ – Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karandikar
6 Practical Proactive Integrity Preservation: A Basis for Malware Defense – Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karandikar
1 Sub-Identities: Toward Operating System Support for Distributed System Security – Phil Snowberger, Douglas Thain
1 Enforcing Application-level Security in Modern Operating Systems – Richard J. Dunn
12 Fine-grained user-space security through virtualization – Thomas R. Gross
73 Ostia: A Delegating Architecture for Secure System Call Interposition – Tal Garfinkel , Ben Pfaff, Mendel Rosenblum - 2003
2 Making Linux Protection Mechanisms Egalitarian with UserFS – Taesoo Kim, Nickolai Zeldovich
3 Information Flow Control for Secure Web Sites – Maxwell Norman Krohn, Frans Kaashoek - 2008
The Right Files at the Right Time – Hayawardh Vijayakumar, Trent Jaeger
The State of the Art of Application Restrictions and Sandboxes: A Survey of Application-oriented Access Controls and their Shortfalls – Z. Cliffe Schreuders, Tanya Mcgill, Christian Payne, Z. Cliffe Schreuders A, Tanya Mcgill B, Christian Payne B - 2012
Process Firewalls: Protecting Processes During Resource Access – Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger