Preventing Privilege Escalation
暂无分享,去创建一个
[1] Hemma Prafullchandra,et al. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2 , 1997, USENIX Symposium on Internet Technologies and Systems.
[2] Daniel F. Sterne,et al. A Domain and Type Enforcement UNIX Prototype , 1995, Comput. Syst..
[3] David A. Wagner,et al. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. Detecting Format String Vulnerabilities with Type Qualifiers , 2001 .
[4] Niels Provos,et al. Diffie-Hellman Group Exchange for the SSH Transport Layer Protocol , 2000 .
[5] Douglas Kilpatrick,et al. Privman: A Library for Partitioning Applications , 2003, USENIX Annual Technical Conference, FREENIX Track.
[6] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[7] Jerome H. Saltzer,et al. Protection and the control of information sharing in multics , 1974, CACM.
[8] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[9] J. Liedtke. On -Kernel Construction , 1995 .
[10] Mark Carson. Sendmail Without the Superuser , 1993, USENIX Security Symposium.
[11] Theodore A. Linden. Operating System Structures to Support Security and Reliable Software , 1976, CSUR.
[12] Peter Deutsch,et al. DEFLATE Compressed Data Format Specification version 1.3 , 1996, RFC.
[13] Matt Bishop,et al. A Flexible Containment Mechanism for Executing Untrusted Code , 2002, USENIX Security Symposium.
[14] David Wagner,et al. Janus: an Approach for Confinement of Untrusted Applications , 1999 .
[15] Daniel F. Sterne,et al. Confining Root Programs with Domain and Type Enforcement , 1996, USENIX Security Symposium.
[16] Todd C. Miller,et al. strlcpy and strlcat - Consistent, Safe, String Copy and Concatenation , 1999, USENIX Annual Technical Conference, FREENIX Track.
[17] Jochen Liedtke,et al. On micro-kernel construction , 1995, SOSP.
[18] Sun Microsystems,et al. XDR: External Data Representation standard , 1987, RFC.
[19] Aladdin Enterprises,et al. ZLIB Compressed Data Format Specification version 3.3 , 1996 .
[20] Dan S. Wallach,et al. Extensible security architectures for Java , 1997, SOSP.
[21] David A. Wagner,et al. A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.
[22] David Evans,et al. Statically Detecting Likely Buffer Overflow Vulnerabilities , 2001, USENIX Security Symposium.
[23] Craig A. Knoblock,et al. Advanced Programming in the UNIX Environment , 1992, Addison-Wesley professional computing series.