Expanding Malware Defense by Securing Software Installations
暂无分享,去创建一个
Zhenkai Liang | Weiqing Sun | V. N. Venkatakrishnan | R. Sekar | Weiqing Sun | Zhenkai Liang | R. Sekar | V. Venkatakrishnan
[1] Fred B. Schneider,et al. Enforceable security policies , 2000, Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems].
[2] Daniel F. Sterne,et al. A Domain and Type Enforcement UNIX Prototype , 1995, Comput. Syst..
[3] Anurag Acharya,et al. MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications , 2000, USENIX Security Symposium.
[4] Zhenkai Liang,et al. Isolated program execution: an application transparent approach for executing untrusted programs , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[5] Yunheung Paek,et al. Advances in Computer Systems Architecture, 12th Asia-Pacific Conference, ACSAC 2007, Seoul, Korea, August 23-25, 2007, Proceedings , 2007, Asia-Pacific Computer Systems Architecture Conference.
[6] Zhenkai Liang,et al. One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments , 2005, NDSS.
[7] David Robert Safford,et al. Trusted computing and open source , 2005, Inf. Secur. Tech. Rep..
[8] Zhenkai Liang,et al. An Approach for Secure Software Installation , 2002, LISA.
[9] A. Acharya,et al. MAPbox: Using Parameterized Behavior Classes to Confine Applications , 1999 .
[10] Merijn de Jonge,et al. Nix: A Safe and Policy-Free System for Software Deployment , 2004, LISA.
[11] Kazuhiko Kato,et al. SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation , 2002, ISSS.
[12] Ching-Hsien Hsu,et al. Critical-Task Anticipation Scheduling Algorithm for Heterogeneous and Grid Computing , 2006, Asia-Pacific Computer Systems Architecture Conference.
[13] Stephen Smalley,et al. Integrating Flexible Support for Security Policies into the Linux Operating System , 2001, USENIX Annual Technical Conference, FREENIX Track.
[14] Jack W. Davidson,et al. Safe virtual execution using software dynamic translation , 2002, 18th Annual Computer Security Applications Conference, 2002. Proceedings..
[15] Daniel Price,et al. Solaris Zones: Operating System Support for Consolidating Commercial Workloads , 2004, LISA.
[16] Daniel C. DuVarney,et al. Model-carrying code: a practical approach for safe execution of untrusted applications , 2003, SOSP '03.
[17] Jeff Dike,et al. A user-mode port of the Linux kernel , 2000, Annual Linux Showcase & Conference.
[18] Hong Chen,et al. Usable Mandatory Integrity Protection for Operating Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[19] Brian Walters,et al. VMware Virtual Platform , 1999 .
[20] Richard Dikau,et al. Long Term Hillslope and Fluvial System Modelling , 2003 .
[21] Diomidis Spinellis,et al. Sandboxing Applications , 2001, USENIX Annual Technical Conference, FREENIX Track.
[22] Akinori Yonezawa,et al. Software Security — Theories and Systems , 2003, Lecture Notes in Computer Science.
[23] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[24] Yang Yu,et al. A feather-weight virtual machine for windows applications , 2006, VEE '06.
[25] Robert N. M. Watson,et al. Jails: confining the omnipotent root , 2000 .
[26] Klaus Erik Schauser,et al. Consh: Confined Execution Environment for Internet Computations , 1998 .
[27] Weiqing Sun,et al. Practical Proactive Integrity Preservation: A Basis for Malware Defense , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[28] Ian Goldberg,et al. A Secure Environment for Untrusted Helper Applications ( Confining the Wily Hacker ) , 1996 .
[29] Hao Chen,et al. Back to the Future: A Framework for Automatic Malware Removal and System Repair , 2006, 2006 22nd Annual Computer Security Applications Conference (ACSAC'06).