Sandboxing Applications (2001)

Cached

Download Links

by Vassilis Prevelakis , Diomidis Spinellis
Venue:In Proceedings of the USENIX Technical Annual Conference, Freenix Track
Citations:29 - 0 self

Documents Related by Co-Citation

375 A Secure Environment for Untrusted Helper Applications -- Confining the Wily Hacker – Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer
77 MAPbox: Using Parameterized Behavior Classes to Confine Applications – Anurag Acharya, Mandar Raje, Ar Raje - 2000
267 Improving Host Security with System Call Policies – Niels Provos - 2002
277 Intrusion Detection via Static Analysis – David Wagner, Drew Dean - 2001
262 Secure Execution Via Program Shepherding – Vladimir Kiriansky , Derek Bruening, Saman Amarasinghe - 2002
467 StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks – Crispin Cowan, Calton Pu, Dave Maier, Heather Hinton, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang - 1998
107 Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools – Tal Garfinkel - 2003
77 Efficient context-sensitive intrusion detection – Jonathon T. Giffin, Somesh Jha, Barton P. Miller - 2004
39 Consh: Confined Execution Environment for Internet Computations – Albert Alexandrov, Paul Kmiec, Klaus Schauser - 1999
175 Mimicry Attacks on Host-Based Intrusion Detection Systems – David Wagner - 2002
68 Detecting manipulated remote call streams – Jonathon T. Giffin, Somesh Jha, Barton P. Miller - 2002
73 Formalizing sensitivity in static analysis for intrusion detection – Henry Hanping Feng, Jonathon T. Giffin, Yong Huang, Somesh Jha, Wenke Lee, Barton P. Miller - 2004
46 A flexible containment mechanism for executing untrusted code – David S. Peterson, Matt Bishop, Raju P - 2002
82 Automating Mimicry Attacks Using Static Binary Analysis – Christopher Kruegel, Engin Kirda, Darren Mutz, William Robertson, Giovanni Vigna - 2005
530 A Sense of Self for Unix Processes – Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff - 1996
128 Anomaly Detection Using Call Stack Information – Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, Weibo Gong - 2003
42 Type-Assisted Dynamic Buffer Overflow Detection – Kyung-Suk Lhee, Steve J. Chapin - 2002
140 Pointguard: Protecting pointers from buffer overflow vulnerabilities – C COWAN, S BEATTIE, J JOHANSEN, P WAGLE - 2003
214 Address obfuscation: an efficient approach to combat a broad range of memory error exploits – Eep Bhatkar, Daniel C. Duvarney, R. Sekar - 2003