메뉴 건너뛰기




Volumn , Issue , 2009, Pages 79-93

Native client: A sandbox for portable, untrusted x86 native code

Author keywords

[No Author keywords available]

Indexed keywords

BROWSER-BASED APPLICATION; COMPUTATIONAL PERFORMANCE; INSTRUCTION SET EXTENSION; NATIVE CODE; OPEN ARCHITECTURE; OPERATING SYSTEMS; ORIENTED FEATURES; RUNTIMES; SIDE EFFECT; SOFTWARE FAULT; SYSTEM INTERACTIONS; WEB APPLICATION;

EID: 69149106605     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2009.25     Document Type: Conference Paper
Times cited : (438)

References (64)
  • 3
    • 0029723619 scopus 로고    scopus 로고
    • Efficient and language-independent mobile programs
    • A. Adl-Tabatabai, G. Langdale, S. Lucco, and R. Wahbe. Efficient and language-independent mobile programs. SIGPLAN Not., 31(5):127-136, 1996.
    • (1996) SIGPLAN Not. , vol.31 , Issue.5 , pp. 127-136
    • Adl-Tabatabai, A.1    Langdale, G.2    Lucco, S.3    Wahbe, R.4
  • 4
    • 70449684546 scopus 로고    scopus 로고
    • AMD64 architecture programmer's manual, volume 1: Application programming
    • Publication number: 24592, September
    • Advanced Micro Devices. AMD64 Architecture Programmer's Manual, Volume 1: Application Programming. Advanced Micro Devices, September 2007. Publication number: 24592.
    • (2007) Advanced Micro Devices
  • 5
    • 70449690534 scopus 로고    scopus 로고
    • Autoconf. http://www.gnu.org/software/autoconf/.
    • Autoconf.
  • 7
    • 0031269854 scopus 로고    scopus 로고
    • Disco: Running Commodity Operating Systems on Scalable Multiprocessors
    • E. Bugnion, S. Devine, K. Govil, and M. Rosenblum. Disco: Running commodity operating systems on scalable multiprocessors. ACM Transactions on Computer Systems, 15(4):412-447, November 1997. (Pubitemid 127449841)
    • (1997) ACM Transactions on Computer Systems , vol.15 , Issue.4 , pp. 412-447
    • Bugnion, E.1    Devine, S.2    Govil, K.3    Rosenblum, M.4
  • 10
    • 0037599474 scopus 로고    scopus 로고
    • The economic cost of publicly announced information security breaches: Empirical evidence from the stock market
    • K. Campbell, L. Gordon, M. Loeb, and L. Zhou. The economic cost of publicly announced information security breaches: empirical evidence from the stock market. Journal of Computer Security, 11(3):431-448, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.3 , pp. 431-448
    • Campbell, K.1    Gordon, L.2    Loeb, M.3    Zhou, L.4
  • 13
    • 0027684663 scopus 로고
    • Defense-in-depth against computer viruses
    • F. B. Cohen. Defense-in-depth against computer viruses. Computers and Security, 11(6):565-584, 1993.
    • (1993) Computers and Security , vol.11 , Issue.6 , pp. 565-584
    • Cohen, F.B.1
  • 16
    • 70449649125 scopus 로고    scopus 로고
    • Directorate for command, control, communications and computer systems
    • U.S. Department of Defense Joint Staff. Information assurance through defense-in-depth, Directorate for Command, Control, Communications and Computer Systems, February
    • Directorate for Command, Control, Communications and Computer Systems, U.S. Department of Defense Joint Staff. Information assurance through defense-in-depth. Technical report, Directorate for Command, Control, Communications and Computer Systems, U.S. Department of Defense Joint Staff, February 2000.
    • (2000) Technical Report, U.S. Department of Defense Joint Staff
  • 18
    • 70449693516 scopus 로고    scopus 로고
    • XDR: External data representation
    • M. Eisler (editor)
    • M. Eisler (editor). XDR: External data representation. Internet RFC 4506, 2006.
    • (2006) Internet RFC 4506
  • 20
    • 70449696425 scopus 로고    scopus 로고
    • VXA: A virtual architecture for durable compressed archives
    • December
    • B. Ford. VXA: A virtual architecture for durable compressed archives. In USENIX File and Storage Technologies, December 2005.
    • (2005) USENIX File and Storage Technologies
    • Ford, B.1
  • 23
    • 84871262255 scopus 로고    scopus 로고
    • GNU binutils. http://www.gnu.org/software/binutils/.
    • GNU Binutils
  • 26
    • 84873306298 scopus 로고    scopus 로고
    • Google Inc. Protocol buffers. http://code.google.com/p/protobuf/.
    • Protocol Buffers
  • 44
    • 70449677049 scopus 로고    scopus 로고
    • Microsoft Corporation. Structured exception handling. http://msdn.microsoft.com/en-us/library/ms680657(VS.85).aspx, 2008.
    • (2008) Structured Exception Handling
  • 47
    • 0003975281 scopus 로고
    • G. Nelson (editor), Prentice-Hall
    • G. Nelson (editor). System Programming in Modula-3. Prentice-Hall, 1991.
    • (1991) System Programming in Modula-3
  • 48
    • 70449675366 scopus 로고    scopus 로고
    • Netscape Corporation
    • Netscape Corporation. Gecko plugin API reference. http://developer. mozilla.org/en/docs/Gecko-Plugin-API-Reference.
    • Gecko Plugin API Reference
  • 50
    • 84878346861 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • August
    • N. Provos. Improving host security with system call policies. In USENIX Security Symposium, August 2003.
    • (2003) USENIX Security Symposium
    • Provos, N.1
  • 52
    • 70449649124 scopus 로고    scopus 로고
    • User-level sandboxing: A safe and efficient mechanism for extensibility
    • Boston University, Computer Science Department, Boston, MA
    • J. G. RichardWest. User-level sandboxing: a safe and efficient mechanism for extensibility. Technical Report TR-2003-2014, Boston University, Computer Science Department, Boston, MA, 2003.
    • (2003) Technical Report TR-2003-2014
    • Richard West, J.G.1
  • 54
    • 70449696422 scopus 로고    scopus 로고
    • Cost of computer viruses top $10 billion already this year
    • August
    • M. Savage. Cost of computer viruses top $10 billion already this year. ChannelWeb, August 2001.
    • (2001) Channel Web
    • Savage, M.1
  • 60
  • 61
    • 0003969633 scopus 로고
    • U. S. Department of Defense, Computer Security Center, December
    • U. S. Department of Defense, Computer Security Center. Trusted computer system evaluation criteria, December 1985.
    • (1985) Trusted Computer System Evaluation Criteria
  • 64
    • 70449675364 scopus 로고    scopus 로고
    • Document Object Model (DOM) level 1 specification
    • Number REC-DOM-Level-1-19981001, October
    • Document Object Model (DOM) Level 1 Specification. Number REC-DOM-Level-1-19981001. World Wide Web Consortium, October 1998.
    • (1998) World Wide Web Consortium


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.