메뉴 건너뛰기




Volumn 3866 LNCS, Issue , 2006, Pages 171-186

Secure untrusted binaries - Provably!

Author keywords

[No Author keywords available]

Indexed keywords

CODE REWRITING; HARDWARE-BASED MEMORY PROTECTION; PROOF-CARRYING CODES; REWRITTEN BINARIES; UNTRUSTED CODE;

EID: 33745649226     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11679219_13     Document Type: Conference Paper
Times cited : (4)

References (13)
  • 2
    • 0032116284 scopus 로고    scopus 로고
    • MiSFIT: Constructing safe extensible systems
    • Small, C., Seltzer, M.I.: MiSFIT: Constructing safe extensible systems. IEEE Concurrency 6 (1998) 34-41
    • (1998) IEEE Concurrency , vol.6 , pp. 34-41
    • Small, C.1    Seltzer, M.I.2
  • 3
    • 0033489650 scopus 로고    scopus 로고
    • SASI enforcement of security policies: A retrospective
    • Caledon Hills, Ontario, Canada, ACM SIGSAC, ACM Press
    • Úlfar Erlingsson, Schneider, F.B.: SASI enforcement of security policies: A retrospective. In: New Security Paradigms Workshop, Caledon Hills, Ontario, Canada, ACM SIGSAC, ACM Press (1999) 87-95
    • (1999) New Security Paradigms Workshop , pp. 87-95
    • Erlingsson, Ú.1    Schneider, F.B.2
  • 5
    • 33745640145 scopus 로고    scopus 로고
    • Efficient, verifiable binary sandboxing for a CISC architecture
    • MIT LCS
    • McCamant, S., Morrisett, G.: Efficient, verifiable binary sandboxing for a CISC architecture. Technical report, MIT LCS (2005)
    • (2005) Technical Report
    • McCamant, S.1    Morrisett, G.2
  • 6
    • 0001800257 scopus 로고    scopus 로고
    • Safe, untrusted agents using proof-carrying code
    • Vigna, G., ed.: Mobile Agents and Security Springer-Verlag, Berlin Germany
    • Necula, G.C., Lee, P.: Safe, untrusted agents using proof-carrying code. In Vigna, G., ed.: Mobile Agents and Security. Volume 1419 of Lecture Notes in Computer Science., Springer-Verlag, Berlin Germany (1998) 61-91
    • (1998) Lecture Notes in Computer Science , vol.1419 , pp. 61-91
    • Necula, G.C.1    Lee, P.2
  • 10
    • 0032667877 scopus 로고    scopus 로고
    • Flexible policy-directed code safety
    • Oakland, CA, IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
    • Evans, D., Twyman, A.: Flexible policy-directed code safety. In: Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press (1999) 32-45
    • (1999) Proceedings of the IEEE Symposium on Research in Security and Privacy , pp. 32-45
    • Evans, D.1    Twyman, A.2
  • 13
    • 0004349103 scopus 로고    scopus 로고
    • Vulcan: Binary transformation in a distributed environment
    • Microsoft Research
    • Srivastava, A., Edwards, A., Vo, H.: Vulcan: Binary transformation in a distributed environment. Technical Report MSR-TR-2001-50, Microsoft Research (2001)
    • (2001) Technical Report , vol.MSR-TR-2001-50
    • Srivastava, A.1    Edwards, A.2    Vo, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.