Privman: A Library for Partitioning Applications.
暂无分享,去创建一个
[1] Sotiris Ioannidis,et al. Sub-operating systems: a new approach to application security , 2002, EW 10.
[2] A. Acharya,et al. MAPbox: Using Parameterized Behavior Classes to Confine Applications , 1999 .
[3] Timothy Fraser,et al. Hardening COTS software with generic software wrappers , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[4] Crispan Cowan,et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks , 1998, USENIX Security Symposium.
[5] Andrew Berman,et al. TRON: Process-Specific File Protection for the UNIX Operating System , 1995, USENIX.
[6] Calton Pu,et al. The Cracker Patch Choice: An Analysis of Post Hoc Security Techniques , 2000 .
[7] Calton Pu,et al. Death, taxes, and imperfect software: surviving the inevitable , 1998, NSPW '98.
[8] David A. Wagner,et al. A Secure Environment for Untrusted Helper Applications , 1996, USENIX Security Symposium.
[9] Fred P. Brooks,et al. The Mythical Man-Month , 1975, Reliable Software.