User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems
暂无分享,去创建一个
Helen J. Wang | Tadayoshi Kohno | Franziska Roesner | Bryan Parno | Crispin Cowan | Alexander Moshchuk | Bryan Parno | Franziska Roesner | Alexander Moshchuk | Crispin Cowan | Tadayoshi Kohno
[1] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[2] Jonathan S. Shapiro,et al. Design of the EROS Trusted Window System , 2004, USENIX Security Symposium.
[3] Steven D. Gribble,et al. A safety-oriented platform for Web applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[4] Lorrie Faith Cranor,et al. A user study of the expandable grid applied to P3P privacy policy visualization , 2008, WPES '08.
[5] Gregg Rothermel,et al. Revealing the copy and paste habits of end users , 2009, 2009 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC).
[6] Mary Ellen Zurko,et al. A Retrospective on the VAX VMM Security Kernel , 1991, IEEE Trans. Software Eng..
[7] I.,et al. Fitts' Law as a Research and Design Tool in Human-Computer Interaction , 1992, Hum. Comput. Interact..
[8] Michael W. Hicks,et al. Automated detection of persistent kernel control-flow attacks , 2007, CCS '07.
[9] Mark S. Miller,et al. Robust composition: towards a unified approach to access control and concurrency control , 2006 .
[10] Adrian Perrig,et al. SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes , 2007, SOSP.
[11] 王莹. 使用Security—Enhanced Linux增强系统安全 , 2003 .
[12] Alan H. Karp,et al. Polaris: virus-safe computing for Windows XP , 2006, CACM.
[13] Helen J. Wang,et al. Permission Re-Delegation: Attacks and Defenses , 2011, USENIX Security Symposium.
[14] I. Scott MacKenzie,et al. Fitts' Law as a Research and Design Tool in Human-Computer Interaction , 1992, Hum. Comput. Interact..
[15] Adam Barth,et al. Protecting Browsers from Extension Vulnerabilities , 2010, NDSS.
[16] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[17] Samuel T. King,et al. Trust and Protection in the Illinois Browser Operating System , 2010, OSDI.
[18] Helen J. Wang,et al. The Multi-Principal OS Construction of the Gazelle Web Browser , 2009, USENIX Security Symposium.
[19] Jon Howell,et al. What You See is What They Get: Protecting users from unwanted use of microphones, cameras, and other sensors , 2010 .
[20] Ka-Ping Yee,et al. User Interaction Design for Secure Systems , 2002, ICICS.
[21] Norman Feske,et al. A Nitpickers guide to a minimal-complexity secure GUI , 2005, 21st Annual Computer Security Applications Conference (ACSAC'05).
[22] Helen J. Wang,et al. Protection and communication abstractions for web browsers in MashupOS , 2007, SOSP.
[23] Ka-Ping Yee,et al. Aligning Security and Usability , 2004, IEEE Secur. Priv..
[24] Zhou Li,et al. Mash-IF: Practical information-flow control within client-side mashups , 2010, 2010 IEEE/IFIP International Conference on Dependable Systems & Networks (DSN).
[25] Samuel T. King,et al. Secure Web Browsing with the OP Web Browser , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[26] Kirstie Hawkey,et al. Do windows users follow the principle of least privilege?: investigating user account control practices , 2010, SOUPS.
[27] Helen J. Wang,et al. Convergence of desktop and web applications on a multi-service OS , 2009 .
[28] David A. Wagner,et al. The Effectiveness of Application Permissions , 2011, WebApps.
[29] Vinod Yegneswaran,et al. BLADE: an attack-agnostic approach for preventing drive-by malware infections , 2010, CCS '10.
[30] David Evans,et al. The user is not the enemy: fighting malware by tracking user intentions , 2008, NSPW '08.
[31] Donghai Tian,et al. Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions , 2011, NDSS.
[32] Charles Reis,et al. Isolating web programs in modern browser architectures , 2009, EuroSys '09.