Codejail: Application-Transparent Isolation of Libraries with Tight Program Interactions
暂无分享,去创建一个
Zhenkai Liang | Roland H. C. Yap | Yongzheng Wu | Sai Sathyanarayan | Zhenkai Liang | R. Yap | Yongzheng Wu | Sai Sathyanarayan
[1] Brian N. Bershad,et al. Recovering device drivers , 2004, TOCS.
[2] G. Danezis,et al. Combining Control-Flow Integrity and Static Analysis for Efficient and Validated Data Sandboxing , 2011 .
[3] Robert Wahbe,et al. Efficient software-based fault isolation , 1994, SOSP '93.
[4] Mani B. Srivastava,et al. A System For Coarse Grained Memory Protection In Tiny Embedded Processors , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[5] R. Sekar,et al. User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement , 2000, NDSS.
[6] Douglas Kilpatrick,et al. Privman: A Library for Partitioning Applications , 2003, USENIX Annual Technical Conference, FREENIX Track.
[7] Neha Narula,et al. Native Client: A Sandbox for Portable, Untrusted x86 Native Code , 2009, IEEE Symposium on Security and Privacy.
[8] Hovav Shacham,et al. Return-Oriented Programming: Systems, Languages, and Applications , 2012, TSEC.
[9] Xi Wang,et al. Software fault isolation with API integrity and multi-principal modules , 2011, SOSP.
[10] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[11] Bryan Ford,et al. Vx32: Lightweight User-level Sandboxing on the x86 , 2008, USENIX Annual Technical Conference.
[12] Jon Howell,et al. Leveraging Legacy Code to Deploy Desktop Applications on the Web , 2008, OSDI.
[13] Martín Abadi,et al. XFI: software guards for system address spaces , 2006, OSDI '06.
[14] Miguel Castro,et al. Fast byte-granularity software fault isolation , 2009, SOSP '09.
[15] Stephen McCamant,et al. Evaluating SFI for a CISC Architecture , 2006, USENIX Security Symposium.
[16] Mark Handley,et al. Wedge: Splitting Applications into Reduced-Privilege Compartments , 2008, NSDI.
[17] Zhi Wang,et al. HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity , 2010, 2010 IEEE Symposium on Security and Privacy.
[18] David Brumley,et al. Privtrans: Automatically Partitioning Programs for Privilege Separation , 2004, USENIX Security Symposium.
[19] Niels Provos,et al. Preventing Privilege Escalation , 2003, USENIX Security Symposium.