Retaining Sandbox Containment Despite Bugs in Privileged Memory-Safe Code

by Armon Dadgar , Jeff Rasley , Justin Samuel , Ivan Beschastnikh , Cosmin Barsan , Arvind Krishnamurthy , Thomas Anderson
Citations:3 - 0 self

Active Bibliography

UNIVERSITY OF CALIFORNIA Santa Barbara Defending Against Malicious Software – Robert Bradley Gilbert, Robert Bradley Gilbert - 2011
490 Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software – James Newsome, Dawn Song - 2005
2011 IEEE Symposium on Security and Privacy – Txbox:buildingsecure Efficientsandboxeswith Systemtransactions, Suman Jana, Donald E. Porter, Vitaly Shmatikov
TxBox:BuildingSecure,EfficientSandboxeswith SystemTransactions – Suman Jana, Donald E. Porter, Vitaly Shmatikov
4 FUNCTIONALITY-BASED APPLICATION CONFINEMENT: Parameterised Hierarchical Application Restrictions – Z. Cliffe Schreuders, Christian Payne
590 Language-Based Information-Flow Security – Andrei Sabelfeld , Andrew C. Myers - 2003
1234 On the Criteria To Be Used in Decomposing Systems into Modules – D. L. Parnas - 1972
615 Exokernel: An Operating System Architecture for Application-Level Resource Management – Dawson R. Engler, M. Frans Kaashoek, James O’toole - 1995
1111 Proof-Carrying Code – George C. Necula - 1997