메뉴 건너뛰기




Volumn 12, Issue 3, 2009, Pages

Alcatraz: An isolated environment for experimenting with untrusted software

Author keywords

Isolation; One way isolation

Indexed keywords

CLIENT APPLICATIONS; CONSISTENCY CRITERION; EXECUTION ENVIRONMENTS; IMPLEMENTATION APPROACHES; ISOLATION; MALICIOUS CODES; ONE-WAY ISOLATION; OPERATING SYSTEMS; SEMANTIC CONSISTENCIES; SOFTWARE CONFIGURATIONS; SOFTWARE PATCHES; SYSTEM CHANGES; WRITE OPERATIONS;

EID: 60349104471     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1455526.1455527     Document Type: Article
Times cited : (21)

References (57)
  • 2
    • 60349132217 scopus 로고    scopus 로고
    • ALCATEAZ. http://www.seclab.cs.sunysb.edu/alcatraz.
    • ALCATEAZ. http://www.seclab.cs.sunysb.edu/alcatraz.
  • 3
    • 60349131698 scopus 로고    scopus 로고
    • BOCHS. http://bochs.sourceforge.net.
    • BOCHS. http://bochs.sourceforge.net.
  • 7
    • 60349119931 scopus 로고    scopus 로고
    • CHUTANI, S., ANDERSON, O. T., KAZAR, M. L., LEVERETT, B. W., MASON, W. A., and SIDEBOTHAM, R. N. 1992. The episode file system. In Proceedings of the USENIX Technical Conference (USENIX'92).
    • CHUTANI, S., ANDERSON, O. T., KAZAR, M. L., LEVERETT, B. W., MASON, W. A., and SIDEBOTHAM, R. N. 1992. The episode file system. In Proceedings of the USENIX Technical Conference (USENIX'92).
  • 8
    • 33947108834 scopus 로고    scopus 로고
    • Chakravyuha: A sandbox operating system for the controlled execution of alien code
    • Tech. rep, IBM T.J. Watson Research Center
    • DAN, A., MOHINDRA, A., RAMASWAMI, R., AND SITARAM, D. 1997. Chakravyuha: A sandbox operating system for the controlled execution of alien code. Tech. rep., IBM T.J. Watson Research Center.
    • (1997)
    • DAN, A.1    MOHINDRA, A.2    RAMASWAMI, R.3    SITARAM, D.4
  • 12
    • 85084162735 scopus 로고    scopus 로고
    • GOLDBERG, I., WAGNER, D., THOMAS, R., AND BREWER, E. A. 1996. A secure environment for untrusted helper applications: Confining the wily hacker. In Proceedings of the USENIX Security Symposium (SECURITY'96).
    • GOLDBERG, I., WAGNER, D., THOMAS, R., AND BREWER, E. A. 1996. A secure environment for untrusted helper applications: Confining the wily hacker. In Proceedings of the USENIX Security Symposium (SECURITY'96).
  • 13
    • 60349131102 scopus 로고    scopus 로고
    • JAIN, K. AND SEKAR, R. 2000. User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. In Proceedings of the Annual Network and Distributed System Security (NDSS'00).
    • JAIN, K. AND SEKAR, R. 2000. User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. In Proceedings of the Annual Network and Distributed System Security (NDSS'00).
  • 15
    • 0003653892 scopus 로고    scopus 로고
    • Postmark: A new file system benchmark
    • Tech. rep. TR3022, Network Applicance Inc
    • KATCHER, J. 1997. Postmark: A new file system benchmark. Tech. rep. TR3022, Network Applicance Inc.
    • (1997)
    • KATCHER, J.1
  • 17
    • 33751032041 scopus 로고    scopus 로고
    • KING, S. T., CHEN, P. M., WANG, Y.-M., VERBOWSKI, C, WANG, H. J., AND LORCH, J. R. 2006. Subvirt: Implementing malware with virtual machines. In Proceedings of the IEEE Symposium on Security and Privacy (SP'06).
    • KING, S. T., CHEN, P. M., WANG, Y.-M., VERBOWSKI, C, WANG, H. J., AND LORCH, J. R. 2006. Subvirt: Implementing malware with virtual machines. In Proceedings of the IEEE Symposium on Security and Privacy (SP'06).
  • 19
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • LAMPSON, B. W. 1973. A note on the confinement problem. Comm. ACM 16, 10, 613-615.
    • (1973) Comm. ACM , vol.16 , Issue.10 , pp. 613-615
    • LAMPSON, B.W.1
  • 20
    • 84944734361 scopus 로고    scopus 로고
    • LIANG, Z., VENKATAKRISHNAN, V., AND SEKAR, R. 2003. Isolated program execution: An application transparent approach for executing untrusted programs. In Proceedings of the Annual Computer Security Applications Conference (ACSAC'03).
    • LIANG, Z., VENKATAKRISHNAN, V., AND SEKAR, R. 2003. Isolated program execution: An application transparent approach for executing untrusted programs. In Proceedings of the Annual Computer Security Applications Conference (ACSAC'03).
  • 21
    • 0034513874 scopus 로고    scopus 로고
    • Intrusion confinement by isolation in information systems
    • LIU, P., JAJODIA, S., AND MCCOLLUM, C.D. 2000. Intrusion confinement by isolation in information systems. J. Comput. Secur. 8.
    • (2000) J. Comput. Secur , vol.8
    • LIU, P.1    JAJODIA, S.2    MCCOLLUM, C.D.3
  • 23
    • 0034479192 scopus 로고    scopus 로고
    • MALKHI, D. AND REITER, M. K. 2000. Secure execution of Java applets using a remote playground. SOFTW. ENGIN. 26, 12.
    • MALKHI, D. AND REITER, M. K. 2000. Secure execution of Java applets using a remote playground. SOFTW. ENGIN. 26, 12.
  • 24
    • 85084162599 scopus 로고    scopus 로고
    • MUNISWAMY-REDDY, K.-K., WRIGHT, C. P., HIMMER, A. P., AND ZADOK, E. 2004. A versatile and user-oriented versioning file system. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST'04).
    • MUNISWAMY-REDDY, K.-K., WRIGHT, C. P., HIMMER, A. P., AND ZADOK, E. 2004. A versatile and user-oriented versioning file system. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST'04).
  • 25
    • 60349099164 scopus 로고    scopus 로고
    • ORMANDY, T. An empirical study into the security exposure to hosts of hostile virtualized environments. http://taviso.decsystem.org/virtsec. pdf.
    • ORMANDY, T. An empirical study into the security exposure to hosts of hostile virtualized environments. http://taviso.decsystem.org/virtsec. pdf.
  • 29
    • 60349088790 scopus 로고    scopus 로고
    • PETERSON, Z. AND BURNS, R. 2003. Ext3cow: The design, implementation, and analysis of metadata for a time-shifting file system. Tech. rep. HSSL-2003-03, Hopkins Storage Systems Lab, Department of Computer Science, Johns Hopkins University.
    • PETERSON, Z. AND BURNS, R. 2003. Ext3cow: The design, implementation, and analysis of metadata for a time-shifting file system. Tech. rep. HSSL-2003-03, Hopkins Storage Systems Lab, Department of Computer Science, Johns Hopkins University.
  • 41
    • 60349083965 scopus 로고    scopus 로고
    • SOFTGRID. http://www.microsoft.com/systemcenter/softgrid/ default.mspx.
    • SOFTGRID. http://www.microsoft.com/systemcenter/softgrid/ default.mspx.
  • 42
    • 60349121152 scopus 로고    scopus 로고
    • SOULES, C., GOODSON, G., STRUNK, J., AND GANGER, G. 2002. Metadata efficiency in a comprehensive versioning file system. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST'02).
    • SOULES, C., GOODSON, G., STRUNK, J., AND GANGER, G. 2002. Metadata efficiency in a comprehensive versioning file system. In Proceedings of the USENIX Conference on File and Storage Technologies (FAST'02).
  • 43
    • 60349121936 scopus 로고    scopus 로고
    • STRACE. http://www.liacs.nl/~wichert/strace.
    • STRACE. http://www.liacs.nl/~wichert/strace.
  • 46
    • 60349083964 scopus 로고    scopus 로고
    • TFS. Translucent file system. SunOS Reference Manual, Sun Microsystems
    • TFS. Translucent file system. SunOS Reference Manual, Sun Microsystems.
  • 49
    • 84868867420 scopus 로고    scopus 로고
    • VIRTUALPC. http://www.microsoft.com/windows/products/winfamily/ virtualpc/default.mspx.
    • , vol.IRTUAL , Issue.PC
  • 50
    • 60349127235 scopus 로고    scopus 로고
    • VMWARE. http://www.vmware.com.
    • VMWARE. http://www.vmware.com.
  • 51
    • 84868888601 scopus 로고    scopus 로고
    • VMWARE. VMware Converter. http://www.vmware.com/products/ converter.
    • VMware Converter
  • 52
    • 60349131448 scopus 로고    scopus 로고
    • WEBSTONE. http://www.mindcraft.com/webstone.
    • WEBSTONE. http://www.mindcraft.com/webstone.
  • 54
    • 60349095324 scopus 로고    scopus 로고
    • YU, Y., GUO, F., NANDA, S., CHUNG LAM, L., AND CKER CHIUEH, T. 2006. A feather-weight virtual machine for windows applications. In Proceedings of the 2nd ACM / USENIX Conference on Virtual Execution Environments (VEE'06).
    • YU, Y., GUO, F., NANDA, S., CHUNG LAM, L., AND CKER CHIUEH, T. 2006. A feather-weight virtual machine for windows applications. In Proceedings of the 2nd ACM / USENIX Conference on Virtual Execution Environments (VEE'06).
  • 56
    • 33748866851 scopus 로고    scopus 로고
    • Data versioning systems
    • Tech. rep, Stony Brook University
    • ZHU, N. 2003. Data versioning systems. Tech. rep., Stony Brook University.
    • (2003)
    • ZHU, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.