메뉴 건너뛰기




Volumn , Issue , 2008, Pages 223-234

Enforcing authorization policies using transactional memory introspection

Author keywords

Reference monitors; Transactional memory

Indexed keywords

AUTHORIZATION POLICY; CORNER CASE; MULTITHREADED SOFTWARES; RACE CONDITION; REFERENCE MONITORS; RUNTIME OVERHEADS; SECURITY CHECKS; SECURITY ENFORCEMENT; SOFTWARE FUNCTIONALITY; SOFTWARE TRANSACTIONAL MEMORY; TRANSACTIONAL MEMORY;

EID: 70349275455     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1455770.1455800     Document Type: Conference Paper
Times cited : (25)

References (62)
  • 1
    • 70349298080 scopus 로고    scopus 로고
    • Semantics of transactional memory and automatic mutual exclusion
    • Jan
    • M. Abadi, A. Birrell, T. Harris, and M. Isard, Semantics of transactional memory and automatic mutual exclusion. In ACM POPL. Jan 2008.
    • (2008) ACM POPL
    • Abadi, M.1    Birrell, A.2    Harris, T.3    Isard, M.4
  • 2
    • 84890865854 scopus 로고    scopus 로고
    • Access control based on execution history
    • M. Abadi and C. Fournet. Access control based on execution history. In NDSS, 2003.
    • (2003) NDSS
    • Abadi, M.1    Fournet, C.2
  • 5
    • 84869607538 scopus 로고    scopus 로고
    • AspectJ project
    • AspectJ project, http://www.eclipse.org/aspectj.
  • 6
    • 70349284217 scopus 로고    scopus 로고
    • From stack inspection to access control: A security analysis for libraries
    • June
    • F. Besson, T. Blanc, C. Fournet, and A.D. Gordon. From stack inspection to access control: a security analysis for libraries. In IEEE CSFW, June 2004.
    • (2004) IEEE CSFW
    • Besson, F.1    Blanc, T.2    Fournet, C.3    Gordon, A.D.4
  • 7
    • 70349287313 scopus 로고    scopus 로고
    • A. Birgisson and IJ. Erlingsson. An implementation and semantics for transactional memory introspection in Haskell. Technical Report RUTR-CS08007, Reykjavik University, Aug 2008.
    • A. Birgisson and IJ. Erlingsson. An implementation and semantics for transactional memory introspection in Haskell. Technical Report RUTR-CS08007, Reykjavik University, Aug 2008.
  • 8
    • 0030092390 scopus 로고    scopus 로고
    • Checking for race conditions in file accesses
    • Spring
    • M. Bishop and M. Digler. Checking for race conditions in file accesses. Computer Systems, 9(2): 131-152, Spring 1996.
    • (1996) Computer Systems , vol.9 , Issue.2 , pp. 131-152
    • Bishop, M.1    Digler, M.2
  • 10
    • 1542298420 scopus 로고
    • Exception handling: A false sense of security
    • Nov
    • T. Cargill. Exception handling: A false sense of security. C++ Report, 6(9), Nov 1994.
    • (1994) C++ Report , vol.6 , Issue.9
    • Cargill, T.1
  • 11
    • 71049148170 scopus 로고    scopus 로고
    • When virtual is better than real
    • May
    • P. M. Chen and B. Noble. When virtual is better than real. In USENIX HotOS, May 2001.
    • (2001) USENIX HotOS
    • Chen, P.M.1    Noble, B.2
  • 12
    • 12844287315 scopus 로고
    • Exception handling
    • Technical Report RJ5724, IBM Research
    • F.Christian. Exception handling. Technical Report RJ5724, IBM Research, 1987.
    • (1987)
    • Christian, F.1
  • 13
    • 79952793792 scopus 로고    scopus 로고
    • Thread-safe dynamic binary transaction using transactional memory
    • Feb
    • J. Chung, M. Dalton, H. Kannan, and C. Kozyrakis. Thread-safe dynamic binary transaction using transactional memory. In IEEE HPCA, Feb 2008.
    • (2008) IEEE HPCA
    • Chung, J.1    Dalton, M.2    Kannan, H.3    Kozyrakis, C.4
  • 14
    • 0001865043 scopus 로고
    • A comparison of commercial and military computer security policies
    • May
    • D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security policies. In IEEE S&P, May 1987.
    • (1987) IEEE S&P
    • Clark, D.D.1    Wilson, D.R.2
  • 15
    • 0001429662 scopus 로고
    • Exception handling and tolerance of software faults
    • Wiley
    • F. Cristian. Exception handling and tolerance of software faults. In Software Fault Tolerance. Wiley, 1995.
    • (1995) Software Fault Tolerance
    • Cristian, F.1
  • 16
    • 11844249640 scopus 로고    scopus 로고
    • ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
    • Dec
    • G. W. Dunlap, S. T. King, S. Cinar. M. Basrai, and P. M. Chen. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In USENIX OSDI, Dec 2002.
    • (2002) USENIX OSDI
    • Dunlap, G.W.1    King, S.T.2    Cinar, S.3    Basrai, M.4    Chen, P.M.5
  • 18
    • 35348853739 scopus 로고    scopus 로고
    • An effective hybrid transactional memory system with strong isolation guarantees, June
    • C. Cao Minh et al.. An effective hybrid transactional memory system with strong isolation guarantees. In ISCA, June 2007.
    • (2007) ISCA
    • Cao Minh, C.1
  • 19
    • 84870923642 scopus 로고    scopus 로고
    • LogTM: Log-based transactional memory
    • Feb
    • K. E. Moore et al. LogTM: Log-based transactional memory. In IEEE HPCA, Feb 2006.
    • (2006) IEEE HPCA
    • Moore, K.E.1
  • 20
    • 4644359934 scopus 로고    scopus 로고
    • Transactional memory coherence and consistency, June
    • L. Hammond et al.. Transactional memory coherence and consistency. In ISCA, June 2004.
    • (2004) ISCA
    • Hammond, L.1
  • 21
    • 70349287312 scopus 로고    scopus 로고
    • Supporting nested transactional memory in LogTM
    • Oct
    • M. J. Moravan et al.. Supporting nested transactional memory in LogTM. In ACM ASPLOS, Oct 2006.
    • (2006) ACM ASPLOS
    • Moravan, M.J.1
  • 22
    • 70349290310 scopus 로고    scopus 로고
    • Hybrid transactional memory
    • Oct
    • P. Damron et al. Hybrid transactional memory. In ACM ASPLOS, Oct 2006.
    • (2006) ACM ASPLOS
    • Damron, P.1
  • 24
    • 4344700755 scopus 로고    scopus 로고
    • Automatic detection and masking of nonatomic exception handling
    • C. Fetzer, P. Felber, and K. Hogstedt. Automatic detection and masking of nonatomic exception handling. IEEE Trans, on Software Engineering, 30(8):547-560, 2004.
    • (2004) IEEE Trans, on Software Engineering , vol.30 , Issue.8 , pp. 547-560
    • Fetzer, C.1    Felber, P.2    Hogstedt, K.3
  • 25
    • 70349291853 scopus 로고    scopus 로고
    • Case study: Open source and commercial applications in a Java-based SELinux cross-domain solution
    • Mar
    • B. Fletcher. Case study: Open source and commercial applications in a Java-based SELinux cross-domain solution. In Annual SELinux Symp., Mar 2006.
    • (2006) Annual SELinux Symp
    • Fletcher, B.1
  • 26
    • 84869623532 scopus 로고    scopus 로고
    • FreeCS-the free chatserver
    • FreeCS-the free chatserver. http://freecs.sourceforge.net.
  • 27
    • 70349270356 scopus 로고    scopus 로고
    • Retrofitting legacy code for authorization policy enforcement
    • May
    • V. Ganapathy, T. Jaeger, and S. Jha. Retrofitting legacy code for authorization policy enforcement. In IEEE S&P, May 2006.
    • (2006) IEEE S&P
    • Ganapathy, V.1    Jaeger, T.2    Jha, S.3
  • 28
    • 70349279672 scopus 로고    scopus 로고
    • Mining security-sensitive operations in legacy code using concept analysis
    • May
    • V. Ganapathy, D. King, T. Jaeger, and S. Jha. Mining security-sensitive operations in legacy code using concept analysis. In ACM/IEEE ICSE, May 2007.
    • (2007) ACM/IEEE ICSE
    • Ganapathy, V.1    King, D.2    Jaeger, T.3    Jha, S.4
  • 29
    • 85080362568 scopus 로고    scopus 로고
    • A virtual machine introspection based architecture for intrusion detection
    • Feb
    • T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In NDSS, Feb 2003.
    • (2003) NDSS
    • Garfinkel, T.1    Rosenblum, M.2
  • 32
    • 1442263994 scopus 로고    scopus 로고
    • Language support for lightweight transactions
    • T. Harris and K. Fraser. Language support for lightweight transactions. SIGPLANNoL, 38(1l):388-402, 2003.
    • (2003) SIGPLANNoL , vol.38 , Issue.1 L , pp. 388-402
    • Harris, T.1    Fraser, K.2
  • 34
    • 34248153669 scopus 로고    scopus 로고
    • A flexible framework for implementing software transactional memory
    • Oct
    • M. Herlihy, V. Luchango, and M. Moir. A flexible framework for implementing software transactional memory. In ACM SIGPLAN OOPSLA, Oct 2006.
    • (2006) ACM SIGPLAN OOPSLA
    • Herlihy, M.1    Luchango, V.2    Moir, M.3
  • 35
    • 28444462792 scopus 로고    scopus 로고
    • Software transactional memory for dynamic-sized data structures
    • July
    • M. Herlihy, V. Luchango, M. Moir, and W. Scherer. Software transactional memory for dynamic-sized data structures. In ACM PODC, July 2003.
    • (2003) ACM PODC
    • Herlihy, M.1    Luchango, V.2    Moir, M.3    Scherer, W.4
  • 37
    • 3142518085 scopus 로고    scopus 로고
    • Consistency analysis of authorization hook placement in the Linux security modules framework
    • May
    • T. Jaeger, A. Edwards, and X. Zhang. Consistency analysis of authorization hook placement in the Linux security modules framework. ACM TISSEC, 7(2): 175-205, May 2004.
    • (2004) ACM TISSEC , vol.7 , Issue.2 , pp. 175-205
    • Jaeger, T.1    Edwards, A.2    Zhang, X.3
  • 40
    • 24744432328 scopus 로고    scopus 로고
    • Securing the X Window system with SELinux
    • Technical Report 03-006, NAI Labs, Mar
    • D. Kilpatrick, W. Salamon, and C. Vance. Securing the X Window system with SELinux. Technical Report 03-006, NAI Labs, Mar 2003.
    • (2003)
    • Kilpatrick, D.1    Salamon, W.2    Vance, C.3
  • 41
    • 10644279224 scopus 로고    scopus 로고
    • Backtracking intrusions
    • Oct
    • S. T. King and P. M. Chen. Backtracking intrusions. In ACM SOSP, Oct 2003.
    • (2003) ACM SOSP
    • King, S.T.1    Chen, P.M.2
  • 42
    • 35348922713 scopus 로고    scopus 로고
    • Transactional Memory. Synthesis Lectures on Computer Architecture
    • J. R. Larus and R. Rajwar. Transactional Memory. Synthesis Lectures on Computer Architecture. Morgan Claypool, 2006.
    • (2006) Morgan Claypool
    • Larus, J.R.1    Rajwar, R.2
  • 46
    • 70349273466 scopus 로고    scopus 로고
    • Parallelizing security checks on commodity hardware
    • March
    • E. Nightingale, D. Peek, P. M. Chen, and J. Flinn. Parallelizing security checks on commodity hardware. In ACM ASPLOS. March 2008.
    • (2008) ACM ASPLOS
    • Nightingale, E.1    Peek, D.2    Chen, P.M.3    Flinn, J.4
  • 50
    • 0001778364 scopus 로고    scopus 로고
    • Enforceable security policies
    • Feb
    • F. B. Schneider. Enforceable security policies. ACM TISSEC, 3(l):3O-5O, Feb 2000.
    • (2000) ACM TISSEC , vol.3 , Issue.L
    • Schneider, F.B.1
  • 51
    • 0012240184 scopus 로고    scopus 로고
    • Dealing with disaster: Surviving misbehaved kernel extensions
    • Oct
    • M. I. Seltzer, Y. Endo, C. Small, and K. A. Smith. Dealing with disaster: Surviving misbehaved kernel extensions. In USENIX OSDI, Oct 1996.
    • (1996) USENIX OSDI
    • Seltzer, M.I.1    Endo, Y.2    Small, C.3    Smith, K.A.4
  • 52
    • 70349294947 scopus 로고
    • Software transactional memory
    • Aug
    • N. Shavit and D. Touitou. Software transactional memory. In ACM PODC, Aug 1995.
    • (1995) ACM PODC
    • Shavit, N.1    Touitou, D.2
  • 56
    • 70349296543 scopus 로고    scopus 로고
    • Integrating X.Org with security-enhanced Linux
    • Mar
    • E. Walsh. Integrating X.Org with security-enhanced Linux. In Annual SELinux Symp., Mar 2007.
    • (2007) Annual SELinux Symp
    • Walsh, E.1
  • 57
    • 41149163668 scopus 로고    scopus 로고
    • Exceptional situations and program reliability
    • Mar
    • W. Weimer and G. C. Necula. Exceptional situations and program reliability. ACM TOPLAS, 30(2), Mar 2008.
    • (2008) ACM TOPLAS , vol.30 , Issue.2
    • Weimer, W.1    Necula, G.C.2
  • 59
    • 70349291851 scopus 로고    scopus 로고
    • x11 perf: The X11 server performance test program suite.
    • x11 perf: The X11 server performance test program suite.
  • 60
    • 70349284216 scopus 로고    scopus 로고
    • The XI1 Server, version XI 1R6.8 (X.Org Foundation).
    • The XI1 Server, version XI 1R6.8 (X.Org Foundation).
  • 61
    • 36448939517 scopus 로고    scopus 로고
    • TightLip: Keeping applications from spilling the beans
    • April
    • A. Yumerefendi, B. Mickle, and L. Cox. TightLip: Keeping applications from spilling the beans. In USENIX NSDI, April 2007.
    • (2007) USENIX NSDI
    • Yumerefendi, A.1    Mickle, B.2    Cox, L.3
  • 62
    • 85084161756 scopus 로고    scopus 로고
    • Using CQUAL for static analysis of authorization hook placement
    • Aug
    • X. Zhang, A. Edwards, and T. Jaeger. Using CQUAL for static analysis of authorization hook placement. In USENIX Security, Aug 2002.
    • (2002) USENIX Security
    • Zhang, X.1    Edwards, A.2    Jaeger, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.