메뉴 건너뛰기




Volumn , Issue , 2006, Pages 161-174

Reducing TCB complexity for security-sensitive applications: Three case studies

Author keywords

Application security; Trusted computing base

Indexed keywords

CODES (SYMBOLS); COMPUTATIONAL COMPLEXITY; LEGACY SYSTEMS; OPTIMIZATION; SOFTWARE ARCHITECTURE; VIRTUAL REALITY;

EID: 34748842601     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1217935.1217951     Document Type: Conference Paper
Times cited : (100)

References (50)
  • 2
    • 34748889791 scopus 로고    scopus 로고
    • Mozilla Foundation
    • Mozilla Foundation. Mozilla Module Owners. http://www.mozilla.org/owners. html
    • Mozilla Module Owners
  • 4
    • 84870639765 scopus 로고    scopus 로고
    • Microsoft Internet Explorer 6
    • Secunia. Vulnerability Report - Microsoft Internet Explorer 6. http://secunia.com/product/11/
    • Vulnerability Report
    • Secunia1
  • 5
    • 84870639765 scopus 로고    scopus 로고
    • Mozilla Firefox 1.x
    • Secunia. Vulnerability Report - Mozilla Firefox 1.x. http://secunia.com/ product/4227/
    • Vulnerability Report
    • Secunia1
  • 6
    • 84870639765 scopus 로고    scopus 로고
    • X11 Windowing System (X11) 6.x
    • Secunia. Vulnerability Report - X11 Windowing System (X11) 6.x. http://secunia.com/product/3913/
    • Vulnerability Report
    • Secunia1
  • 7
    • 84870639765 scopus 로고    scopus 로고
    • Linux Kernel 2.4.x
    • Secunia. Vulnerability Report - Linux Kernel 2.4.x. http://secunia.com/ product/763/
    • Vulnerability Report
    • Secunia1
  • 10
    • 34748823429 scopus 로고    scopus 로고
    • Trusted Computing Group
    • Trusted Computing Group. TCG Main Specification v1.1b, https://www.trustedcomputinggroup.org/
    • TCG Main Specification v1.1b
  • 13
    • 0020847373 scopus 로고
    • An Empirical Study of a Complexity Family
    • November
    • V. Basili and D. Hutchens. An Empirical Study of a Complexity Family. In IEEE Transactions on Software Engineering, Volume 9, No. 6, November 1983, pp. 664-672.
    • (1983) IEEE Transactions on Software Engineering , vol.9 , Issue.6 , pp. 664-672
    • Basili, V.1    Hutchens, D.2
  • 14
    • 85084162921 scopus 로고    scopus 로고
    • Privtrans: Automatically Partitioning Programs for Privilege Separation
    • San Diego, USA. Aug 9-13
    • D. Brumley, D. X. Song. Privtrans: Automatically Partitioning Programs for Privilege Separation. In Proc. USENIX Security Symposium, San Diego, USA. Aug 9-13, 2004.
    • (2004) Proc. USENIX Security Symposium
    • Brumley, D.1    Song, D.X.2
  • 20
    • 0034245310 scopus 로고    scopus 로고
    • Quantitative Analysis of Faults and Failures in a Complex Software System
    • N. E. Fenton, N. Ohlsson., Quantitative Analysis of Faults and Failures in a Complex Software System. In IEEE Trans. Software Eng. 26(8): 797-814, 2000.
    • (2000) IEEE Trans. Software Eng , vol.26 , Issue.8 , pp. 797-814
    • Fenton, N.E.1    Ohlsson, N.2
  • 26
    • 34748856078 scopus 로고    scopus 로고
    • Mikro-SINA-Hands-on Experiences with the Nizza Security Architecture
    • Darmstadt, Germany, March
    • C. Helmuth, A. Warg, and N. Feske. Mikro-SINA-Hands-on Experiences with the Nizza Security Architecture. In Proceedings of the D.A.C.H Security 2005, Darmstadt, Germany, March 2005.
    • (2005) Proceedings of the D.A.C.H Security 2005
    • Helmuth, C.1    Warg, A.2    Feske, N.3
  • 27
    • 34748875142 scopus 로고    scopus 로고
    • A. Herzberg and A. Gbara, TrustBar: Protecting (even Naïve) Web Users from Spoofing and Phishing Attacks, Cryptology ePrint Archive, Report 2004/155. 2004.
    • A. Herzberg and A. Gbara, TrustBar: Protecting (even Naïve) Web Users from Spoofing and Phishing Attacks, Cryptology ePrint Archive, Report 2004/155. 2004.
  • 28
    • 77951450625 scopus 로고    scopus 로고
    • Reducing TCB size by using untrusted components - small kernels versus virtual machine monitors
    • Leuven, Belgium
    • Hohmuth, M., M. Peter, H. Härtig, and J. Shapiro. "Reducing TCB size by using untrusted components - small kernels versus virtual machine monitors", in Proc. of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004.
    • (2004) Proc. of the 11th ACM SIGOPS European Workshop
    • Hohmuth, M.1    Peter, M.2    Härtig, H.3    Shapiro, J.4
  • 31
    • 21644458439 scopus 로고    scopus 로고
    • Implementing an untrusted operating system on trusted hardware
    • Bolton Landing, NY
    • D. Lie, C.A. Thekkath and M. Horowitz, Implementing an untrusted operating system on trusted hardware, In 19th ACM-SOSP,2003, Bolton Landing, NY.
    • 19th ACM-SOSP,2003
    • Lie, D.1    Thekkath, C.A.2    Horowitz, M.3
  • 34
    • 47649085814 scopus 로고    scopus 로고
    • Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software
    • Boston, Dec
    • X. Qie, R. Pang, L. L. Peterson, Defensive Programming: Using an Annotation Toolkit to Build DoS-Resistant Software. In OSDI 2002, Boston, Dec. 2002.
    • (2002) OSDI 2002
    • Qie, X.1    Pang, R.2    Peterson, L.L.3
  • 38
    • 0016555241 scopus 로고
    • The Protection of Information in Computer Systems
    • Sept
    • JH Saltzer and MD Schroeder, The Protection of Information in Computer Systems, Proc. of the IEEE, Vol.63, No.9, Sept. 1975, pp.1278-1308.
    • (1975) Proc. of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 40
    • 34748818617 scopus 로고    scopus 로고
    • Software Complexity and Security
    • March
    • B. Sehneier. Software Complexity and Security. Crypto-Gram Newsletter. March 2000. http://www.schneier.com/crypto-gram-0003.html
    • (2000) Crypto-Gram Newsletter
    • Sehneier, B.1
  • 43
    • 0022044747 scopus 로고
    • Identifying Error-prone Software -An Empirical Study
    • April
    • V. Y. Shen, T. Yu, S. M. Thebaut, and L. R. Paulsen, Identifying Error-prone Software -An Empirical Study, In IEEE TOSE, Vol. SE-11, pp. 317-323, April 1985.
    • (1985) IEEE TOSE , vol.SE-11 , pp. 317-323
    • Shen, V.Y.1    Yu, T.2    Thebaut, S.M.3    Paulsen, L.R.4
  • 49
    • 85084164351 scopus 로고    scopus 로고
    • Wright, C., C. Cowan, S. Smalley, J. Morris, G. Kroah-Hartman. Linux Security Modules: General Security Support for the Linux Kernel. In the Proceedings of the 2002 Usenix Security Symposium, Aug 2002, San Francisco.
    • Wright, C., C. Cowan, S. Smalley, J. Morris, G. Kroah-Hartman. Linux Security Modules: General Security Support for the Linux Kernel. In the Proceedings of the 2002 Usenix Security Symposium, Aug 2002, San Francisco.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.