Results 1 - 10
of
566
Untrusted Code
, 1996
"... ided byany level of cryptography. For the untrusted software to be useful it may have to be granted access to information that it # Email: flra, ara, sverkerg@sics.se potentially can misuse. There is a notion of risk involved in dealing with untrusted code, and this is not well supported in conve ..."
Abstract
- Add to MetaCart
ided byany level of cryptography. For the untrusted software to be useful it may have to be granted access to information that it # Email: flra, ara, sverkerg@sics.se potentially can misuse. There is a notion of risk involved in dealing with untrusted code, and this is not well supported
Proofs of Safety for Untrusted Code
, 1999
"... Proof-carrying code is a technique that can be used to execute untrusted code safely. A code consumer specifies requirements and safety rules which define the safe behavior of a system, and a code producer packages each program with a formal proof that the program satisfies the requirements. The ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Proof-carrying code is a technique that can be used to execute untrusted code safely. A code consumer specifies requirements and safety rules which define the safe behavior of a system, and a code producer packages each program with a formal proof that the program satisfies the requirements
Concerning Untrusted Code
, 2008
"... Large class of security problems is related to usage of untrusted code that is run with excess of authority. Most of the programs and applications we use is not loyal to us and we have very limited mechanisms that would enable us to run it without security risk. Current operating systems contain eff ..."
Abstract
- Add to MetaCart
Large class of security problems is related to usage of untrusted code that is run with excess of authority. Most of the programs and applications we use is not loyal to us and we have very limited mechanisms that would enable us to run it without security risk. Current operating systems contain
Hardware-enforced fine-grained isolation of untrusted code
, 2009
"... We present a novel combination of hardware (architecture) and software(compiler)techniquestosupportthesafeexecutionofuntrusted code. While other efforts focus on isolating processes, our approach isolates code and data at a function (as in, C function) level, to enable fine-grained protection within ..."
Abstract
-
Cited by 3 (3 self)
- Add to MetaCart
within a process as needed fordownloadedplugins,libraries,andmodificationsofopen-source projects. Our solution also enforces timing restrictions to detect denial of service from untrusted code, and supports protection of dynamicallyallocatedmemory. Becausebookkeepingdatacanbecome substantial (permission
A flexible containment mechanism for executing untrusted code
- In Proceedings of the 11th USENIX Security Symposium
, 2002
"... Symposium ..."
Security in Untrusted Code Environments: Missing Pieces of the Puzzle
, 2002
"... Security enforcement mechanisms for controlling the execution of untrusted component code have evolved away from the strict sandbox confinement toward more flexible code access security. Although the added flexibility has enabled richer functionality and support for more fine-grained policies, compo ..."
Abstract
- Add to MetaCart
Security enforcement mechanisms for controlling the execution of untrusted component code have evolved away from the strict sandbox confinement toward more flexible code access security. Although the added flexibility has enabled richer functionality and support for more fine-grained policies
Results 1 - 10
of
566