메뉴 건너뛰기




Volumn , Issue , 2006, Pages 223-232

Data sandboxing: A technique for enforcing confidentiality policies

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK CONNECTION; PROGRAM SLICING; SANDBOXING;

EID: 39049154912     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ACSAC.2006.22     Document Type: Conference Paper
Times cited : (17)

References (25)
  • 1
    • 85084161234 scopus 로고    scopus 로고
    • Mapbox: Using parameterized behavior classes to confine applications
    • A. Acharya and M. Raje. Mapbox: Using parameterized behavior classes to confine applications. In USENIX Security Symposium, 2000.
    • (2000) USENIX Security Symposium
    • Acharya, A.1    Raje, M.2
  • 2
    • 0003400251 scopus 로고
    • Secure computer systems: Mathematical foundations
    • Technical Report MTR-2547, 1, MITRE Corp, Bedford, MA
    • D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations. Technical Report MTR-2547, Vol. 1, MITRE Corp., Bedford, MA, 1973.
    • (1973)
    • Bell, D.E.1    LaPadula, L.J.2
  • 4
    • 27644599042 scopus 로고    scopus 로고
    • Privtrans: Automatic privilege separation
    • San Diego
    • D. Brumley and D. Song. Privtrans: Automatic privilege separation. In USENIX Security Symposium, San Diego, 2004.
    • (2004) USENIX Security Symposium
    • Brumley, D.1    Song, D.2
  • 7
    • 85180527583 scopus 로고    scopus 로고
    • Traps and pitfalls: Practical problems in in system call interposition based security tools
    • T. Garfinkel. Traps and pitfalls: Practical problems in in system call interposition based security tools. In NDSS, 2003.
    • (2003) NDSS
    • Garfinkel, T.1
  • 8
  • 9
    • 85084164558 scopus 로고    scopus 로고
    • Statically detecting likely buffer overflow vulnerabilities
    • Washington, D.C, August
    • D. Larochelle and D. Evans. Statically detecting likely buffer overflow vulnerabilities. In USENIX Security Symposium, Washington, D.C., August 2001.
    • (2001) USENIX Security Symposium
    • Larochelle, D.1    Evans, D.2
  • 12
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software
    • San Diego
    • J. Newsome and D. Song. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In Network and Distributed System Security Symposium (NDSS), San Diego, 2005.
    • (2005) Network and Distributed System Security Symposium (NDSS)
    • Newsome, J.1    Song, D.2
  • 14
    • 84878346861 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • N. Provos. Improving host security with system call policies. In 12th USENIX Security Symposium, 2003.
    • (2003) 12th USENIX Security Symposium
    • Provos, N.1
  • 19
    • 85084164620 scopus 로고    scopus 로고
    • Detecting format string vulnerabilities with type qualifiers
    • Washington, D.C, August
    • U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format string vulnerabilities with type qualifiers. In USENIX Security Symposium, Washington, D.C., August 2001.
    • (2001) USENIX Security Symposium
    • Shankar, U.1    Talwar, K.2    Foster, J.S.3    Wagner, D.4
  • 20
    • 0000990322 scopus 로고
    • A survey of program slicing techniques
    • F. Tip. A survey of program slicing techniques. Journal of programming languages, 3:121-189, 1995.
    • (1995) Journal of programming languages , vol.3 , pp. 121-189
    • Tip, F.1
  • 23
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks
    • W. Xu, S. Bhatkar, and R. Sekar. Taint-enhanced policy enforcement: A practical approach to defeat a wide range of attacks. In USENIX Security Symposium, 2006.
    • (2006) USENIX Security Symposium
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.