-
1
-
-
84862431569
-
-
CERT Advisories. http://www.cert.org/advisories/.
-
CERT Advisories
-
-
-
3
-
-
85084161234
-
Mapbox: Using parameterized behavior classes to confine applications
-
Denver, CO, August
-
A. Acharya and M. Raje. Mapbox: Using parameterized behavior classes to confine applications. In Proceedings of the 2000 USENIX Security Symposium, pages 1-17, Denver, CO, August 2000.
-
(2000)
Proceedings of the 2000 USENIX Security Symposium
, pp. 1-17
-
-
Acharya, A.1
Raje, M.2
-
6
-
-
85084161168
-
TRON: Process-Specific File Protection for the UNIX Operating System
-
A. Berman, V. Bourassa, and E. Selberg. TRON: Process-Specific File Protection for the UNIX Operating System. In Proceedings of the USENIX 1995 Technical Conference, New Orleans, Louisiana, January 1995.
-
Proceedings of the USENIX 1995 Technical Conference, New Orleans, Louisiana, January 1995
-
-
Berman, A.1
Bourassa, V.2
Selberg, E.3
-
7
-
-
1542697134
-
SubDomain: Parsimonious Security for Server Appliances
-
C. Cowan, S. Beattie, C. Pu, P.Wagle, and V. Gligor. SubDomain: Parsimonious Security for Server Appliances. In Proceedings of the 14th USENIX System Administration Conference (LISA 2000), Mar. 2000.
-
Proceedings of the 14th USENIX System Administration Conference (LISA 2000), Mar. 2000
-
-
Cowan, C.1
Beattie, S.2
Pu, C.3
Wagle, P.4
Gligor, V.5
-
10
-
-
84940106242
-
Hardening COTS Software with Generic Software Wrappers
-
T. Fraser, L. Badger, and M. Feldman. Hardening COTS Software with Generic Software Wrappers. In Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1999.
-
Proceedings of the IEEE Symposium on Security and Privacy, Oakland, CA, May 1999
-
-
Fraser, T.1
Badger, L.2
Feldman, M.3
-
11
-
-
0003246945
-
SLIC: An Extensibility System for Commodity Operating Systems
-
June
-
D. P. Ghormley, D. Petrou, S. H. Rodrigues, and T. E. Anderson. SLIC: An Extensibility System for Commodity Operating Systems. In Proceedings of the 1998 USENIX Annual Technical Conference, pages 39-52, June 1998.
-
(1998)
Proceedings of the 1998 USENIX Annual Technical Conference
, pp. 39-52
-
-
Ghormley, D.P.1
Petrou, D.2
Rodrigues, S.H.3
Anderson, T.E.4
-
15
-
-
0004100755
-
-
Technical Report MS-CIS-98-25, Department of Computer and Information Science, University of Pennsylvania, February
-
M. Hicks, P. Kakkar, J. T. Moore, C. A. Gunter, and S. Nettles. PLAN: A Programming Language for Active Networks. Technical Report MS-CIS-98-25, Department of Computer and Information Science, University of Pennsylvania, February 1998.
-
(1998)
PLAN: A Programming Language for Active Networks
-
-
Hicks, M.1
Kakkar, P.2
Moore, J.T.3
Gunter, C.A.4
Nettles, S.5
-
17
-
-
85084161058
-
Building systems that flexibly control downloaded executable content
-
San Jose, Ca.
-
T. Jaeger, A. D. Rubin, and A. Prakash. Building systems that flexibly control downloaded executable content. In Proceedings of the 1996 USENIX Security Symposium, pages 131-148, San Jose, Ca., 1996.
-
(1996)
Proceedings of the 1996 USENIX Security Symposium
, pp. 131-148
-
-
Jaeger, T.1
Rubin, A.D.2
Prakash, A.3
-
18
-
-
77954485300
-
SUID and SGID Based Attacks on UNIX: A Look at One Form of the Use and Abuse of Privileges
-
R. Kaplan. SUID and SGID Based Attacks on UNIX: a Look at One Form of the Use and Abuse of Privileges. Computer Security Journal, 9(1):73-7, 1993.
-
(1993)
Computer Security Journal
, vol.9
, Issue.1
, pp. 73-77
-
-
Kaplan, R.1
-
20
-
-
77954532180
-
The Safe-Tcl Security Model
-
J. Y. Levy, L. Demailly, J. K. Ousterhout, and B. B. Welch. The Safe-Tcl Security Model. In USENIX 1998 Annual Technical Conference, New Orleans, Louisiana, June 1998.
-
USENIX 1998 Annual Technical Conference, New Orleans, Louisiana, June 1998
-
-
Levy, J.Y.1
Demailly, L.2
Ousterhout, J.K.3
Welch, B.B.4
-
26
-
-
0003143922
-
The flask security architecture: System support for diverse security policies
-
Denver, CO, August
-
R. Spencer, S. Smalley, P. Loscocco, M. Hibler, D. Anderson, and J. Lepreau. The flask security architecture: System support for diverse security policies. In Proceedings of the 2000 USENIX Security Symposium, pages 123-139, Denver, CO, August 2000.
-
(2000)
Proceedings of the 2000 USENIX Security Symposium
, pp. 123-139
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Anderson, D.5
Lepreau, J.6
-
28
-
-
0027836576
-
Efficient Software - Based Fault Isolation
-
December
-
R. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham. Efficient Software - Based Fault Isolation. In Proceedings of the 14th ACM Symposium on Operating Systems Principles, pages 203-216, December 1993.
-
(1993)
Proceedings of the 14th ACM Symposium on Operating Systems Principles
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.E.3
Graham, S.L.4
-
29
-
-
85084161648
-
Confining root programs with domain and type enforcement
-
July
-
K. M.Walker, D. F. Stern, L. Badger, K. A. Oosendorp, M. J. Petkac, and D. L. Sherman. Confining root programs with domain and type enforcement. In Proceedings of the 1996 USENIX Security Symposium, pages 21-36, July 1996.
-
(1996)
Proceedings of the 1996 USENIX Security Symposium
, pp. 21-36
-
-
Walker, K.M.1
Stern, D.F.2
Badger, L.3
Oosendorp, K.A.4
Petkac, M.J.5
Sherman, D.L.6
|