The Right Files at the Right Time
暂无分享,去创建一个
[1] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[2] Xiang Cai,et al. Exploiting Unix File-System Races via Algorithmic Complexity Attacks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[3] Sam Weber,et al. The Caernarvon secure embedded operating system , 2008, OPSR.
[4] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[5] Eddie Kohler,et al. Making information flow explicit in HiStar , 2006, OSDI '06.
[6] William R. Harris,et al. DIFC programs by automatic instrumentation , 2010, CCS '10.
[7] Paul V. Mockapetris,et al. Domain names - implementation and specification , 1987, RFC.
[8] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[9] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[10] Matt Bishop,et al. Checking for Race Conditions in File Accesses , 1996, Comput. Syst..
[11] Trent Jaeger,et al. STING: Finding Name Resolution Vulnerabilities in Programs , 2012, USENIX Security Symposium.
[12] Anurag Acharya,et al. MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications , 2000, USENIX Security Symposium.
[13] Eugene Tsyrklevich,et al. Dynamic Detection and Prevention of Race Conditions in File Accesses , 2003, USENIX Security Symposium.
[14] William S. McPhee. Operating System Integrity in OS/VS2 , 1974, IBM Syst. J..
[15] Christopher Krügel,et al. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[16] Calton Pu,et al. TOCTTOU vulnerabilities in UNIX-style file systems: an anatomical study , 2005, FAST'05.
[17] Trent Jaeger,et al. From Trusted to Secure: Building and Executing Applications That Enforce System Security , 2007, USENIX Annual Technical Conference.
[18] Steve J. Chapin,et al. Detection of file-based race conditions , 2005, International Journal of Information Security.
[19] Nikita Borisov,et al. Fixing Races for Fun and Profit: How to Abuse atime , 2005, USENIX Security Symposium.
[20] Weiqing Sun,et al. Practical Proactive Integrity Preservation: A Basis for Malware Defense , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[21] Crispin Cowan,et al. RaceGuard: Kernel Protection From Temporary File Race Vulnerabilities , 2001, USENIX Security Symposium.
[22] Eddie Kohler,et al. Information flow control for standard OS abstractions , 2007, SOSP.
[23] Niels Provos,et al. Improving Host Security with System Call Policies , 2003, USENIX Security Symposium.
[24] Andrew C. Myers,et al. A decentralized model for information flow control , 1997, SOSP.
[25] Trent Jaeger,et al. Verifying Compliance of Trusted Programs , 2008, USENIX Security Symposium.
[26] Andrew Berman,et al. TRON: Process-Specific File Protection for the UNIX Operating System , 1995, USENIX.
[27] Shai Halevi,et al. Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation , 2010, NDSS.
[28] Xin Qi,et al. Fabric: a platform for secure distributed computation and storage , 2009, SOSP '09.
[29] David A. Wagner,et al. A Secure Environment for Untrusted Helper Applications , 1996, USENIX Security Symposium.
[30] Tal Garfinkel,et al. Ostia: A Delegating Architecture for Secure System Call Interposition , 2004, NDSS.
[31] Trent Jaeger,et al. Toward Automated Information-Flow Integrity Verification for Security-Critical Applications , 2006, NDSS.
[32] Daniel C. DuVarney,et al. Model-carrying code: a practical approach for safe execution of untrusted applications , 2003, SOSP '03.
[33] Giovanni Vigna,et al. Testing network-based intrusion detection signatures using mutant exploits , 2004, CCS '04.
[34] Sape Mullender,et al. Distributed systems , 1989 .
[35] Trent Jaeger,et al. Integrity walls: finding attack surfaces from mandatory access control policies , 2012, ASIACCS '12.
[36] Tomer Hertz,et al. Portably Solving File TOCTTOU Races with Hardness Amplification , 2008, FAST.
[37] Hong Chen,et al. Usable Mandatory Integrity Protection for Operating Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[38] Alan J. Hu,et al. Fixing Races for Fun and Profit: How to Use access(2) , 2004, USENIX Security Symposium.
[39] Henry M. Levy,et al. Capability-Based Computer Systems , 1984 .