• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 566
Next 10 →

Untrusted Code

by Major Security Problem, Lars Rasmusson, Andreas Rasmusson, Sverker Janson , 1996
"... ided byany level of cryptography. For the untrusted software to be useful it may have to be granted access to information that it # Email: flra, ara, sverkerg@sics.se potentially can misuse. There is a notion of risk involved in dealing with untrusted code, and this is not well supported in conve ..."
Abstract - Add to MetaCart
ided byany level of cryptography. For the untrusted software to be useful it may have to be granted access to information that it # Email: flra, ara, sverkerg@sics.se potentially can misuse. There is a notion of risk involved in dealing with untrusted code, and this is not well supported

Proofs of Safety for Untrusted Code

by Grigore Rosu, Nathan Segerlind , 1999
"... Proof-carrying code is a technique that can be used to execute untrusted code safely. A code consumer specifies requirements and safety rules which define the safe behavior of a system, and a code producer packages each program with a formal proof that the program satisfies the requirements. The ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Proof-carrying code is a technique that can be used to execute untrusted code safely. A code consumer specifies requirements and safety rules which define the safe behavior of a system, and a code producer packages each program with a formal proof that the program satisfies the requirements

Concerning Untrusted Code

by unknown authors , 2008
"... Large class of security problems is related to usage of untrusted code that is run with excess of authority. Most of the programs and applications we use is not loyal to us and we have very limited mechanisms that would enable us to run it without security risk. Current operating systems contain eff ..."
Abstract - Add to MetaCart
Large class of security problems is related to usage of untrusted code that is run with excess of authority. Most of the programs and applications we use is not loyal to us and we have very limited mechanisms that would enable us to run it without security risk. Current operating systems contain

Extensible Untrusted Code Verification

by Robert Richard Schneck - UNIVERSITY OF CALIFORNIA, BERKELEY , 2004
"... ..."
Abstract - Cited by 7 (1 self) - Add to MetaCart
Abstract not found

1 Introduction Concerning Untrusted Code

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

Hardware-enforced fine-grained isolation of untrusted code

by Eugen Leontie, Rahul Simha, Gedare Bloom, Joseph Zambreno, Bhagirath Narahari , 2009
"... We present a novel combination of hardware (architecture) and software(compiler)techniquestosupportthesafeexecutionofuntrusted code. While other efforts focus on isolating processes, our approach isolates code and data at a function (as in, C function) level, to enable fine-grained protection within ..."
Abstract - Cited by 3 (3 self) - Add to MetaCart
within a process as needed fordownloadedplugins,libraries,andmodificationsofopen-source projects. Our solution also enforces timing restrictions to detect denial of service from untrusted code, and supports protection of dynamicallyallocatedmemory. Becausebookkeepingdatacanbecome substantial (permission

A flexible containment mechanism for executing untrusted code

by David S. Peterson, Matt Bishop, Raju P - In Proceedings of the 11th USENIX Security Symposium , 2002
"... Symposium ..."
Abstract - Cited by 57 (2 self) - Add to MetaCart
Abstract not found

Security in Untrusted Code Environments: Missing Pieces of the Puzzle

by Valentin Razmov , 2002
"... Security enforcement mechanisms for controlling the execution of untrusted component code have evolved away from the strict sandbox confinement toward more flexible code access security. Although the added flexibility has enabled richer functionality and support for more fine-grained policies, compo ..."
Abstract - Add to MetaCart
Security enforcement mechanisms for controlling the execution of untrusted component code have evolved away from the strict sandbox confinement toward more flexible code access security. Although the added flexibility has enabled richer functionality and support for more fine-grained policies

Resource Control of Untrusted Code in an Open Network Environment

by Paul B. Menage , 2003
"... ..."
Abstract - Add to MetaCart
Abstract not found

Protecting Sensitive Information from Untrusted Code

by Indrajit Roy , 2010
"... ..."
Abstract - Add to MetaCart
Abstract not found
Next 10 →
Results 1 - 10 of 566
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University