Secure Applications Need Flexible Operating Systems (1997)


Download Links

by David Mazieres , M. Frans Kaashoek
Venue:In Proceedings of the 6th Workshop on Hot Topics in Operating Systems (HotOS-VI
Citations:31 - 1 self

Documents Related by Co-Citation

135 Checking for Race Conditions in File Accesses – Matt Bishop, Michael Dilger - 1996
20 Fixing Races for Fun and Profit: How to use access(2) – Drew Dean, Alan J. Hu - 2004
684 Efficient Software-Based Fault Isolation – Robert Wahbe, Steven Lucco, Thomas E. Anderson, Susan L. Graham - 1993
22 Noninterference and intrusion detection – C KO, T REDMOND
25 Model Checking an Entire Linux Distribution for Security Violations – Benjamin Schwarz, Hao Chen, David Wagner, Geoff Morrison, Jacob West, Jeremy Lin - 2005
52 Experience with Transactions in QuickSilver – Prank Schmuck, Jim Wyllie - 1991
21 Dynamic detection and prevention of race conditions in file accesses – Eugene Tsyrklevich, Bennet Yee - 2003
17 Fixing races for fun and profit: how to abuse atime – Nikita Borisov, Rob Johnson, Naveen Sastry, David Wagner - 2005
11 Detection of file-based race conditions – K suk Lhee, S J Chapin - 2005
186 Extensible security architecture for Java – Dan S. Wallach, Dirk Balfanz, Drew Dean, Edward W. Felten - 1997
131 The Flask Security Architecture: System Support for Diverse Security Policies – Ray Spencer, Secure Computing Corporation, Stephen Smalley, Peter Loscocco, National Security Agency, Mike Hibler David Andersen - 1999
7 Portably preventing file race attacks with user-mode path resolution – Dan Tsafrir, Tomer Hertz, David Wagner, Dilma Da Silva - 2008
39 Consh: Confined Execution Environment for Internet Computations – Albert Alexandrov, Paul Kmiec, Klaus Schauser - 1999
375 A Secure Environment for Untrusted Helper Applications -- Confining the Wily Hacker – Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer
251 Dealing with disaster: Surviving misbehaved kernel extensions – Margo I. Seltzer, Yasuhiro Endo, Christopher Small, Keith A. Smith - 1996
17 Extending ACID Semantics to the File System – Charles P. Wright, Richard Spillane, Gopalan Sivathanu, Erez Zadok - 2006
9 Preventing race condition attacks on file-systems – P UPPULURI, U JOSHI, A RAY
6 Monitoring the security health of software systems – A AGGARWAL, P JALOTE - 2006
105 Detecting Past and Present Intrusions through Vulnerability-Specific Predicates – Ashlesha Joshi, Samuel T. King, George W. Dunlap, Peter M. Chen - 2005