메뉴 건너뛰기




Volumn , Issue , 2005, Pages

A Black-Box Tracing Technique to Identify Causes of Least-Privilege Incompatibilities

Author keywords

[No Author keywords available]

Indexed keywords

BLACK BOX TRACING; HELP SYSTEMS; LEAST PRIVILEGE; LOCAL SYSTEM; REAL-WORLD; SYSTEM ADMINISTRATORS; SYSTEMS POLICIES; TRACING TECHNIQUE; USER LEVELS; WINDOW SYSTEM;

EID: 72249103625     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (4)

References (34)
  • 1
    • 85084161234 scopus 로고    scopus 로고
    • MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications
    • A. Acharya and M. Raje. MAPbox: Using Parameterized Behavior Classes to Confine Untrusted Applications. USENIX Security 2000.
    • (2000) USENIX Security
    • Acharya, A.1    Raje, M.2
  • 2
    • 0036086884 scopus 로고    scopus 로고
    • Using Programmer-Written Compiler Extensions to Catch Security Holes
    • K. Ashcraft and D. Engler. Using Programmer-Written Compiler Extensions to Catch Security Holes. IEEE Security and Privacy 2002.
    • (2002) IEEE Security and Privacy
    • Ashcraft, K.1    Engler, D.2
  • 5
    • 85084162921 scopus 로고    scopus 로고
    • Privtrans: Automatically partitioning Programs for Privilege Separation
    • D. Brumley and D. Song. Privtrans: Automatically partitioning Programs for Privilege Separation. USENIX Security 2004.
    • (2004) USENIX Security
    • Brumley, D.1    Song, D.2
  • 6
    • 84988659301 scopus 로고
    • Sendmail without the Superuser
    • M. E. Carson. Sendmail without the Superuser. USENIX Security 1993.
    • (1993) USENIX Security
    • Carson, M. E.1
  • 14
    • 85180527583 scopus 로고    scopus 로고
    • Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
    • T. Garfinkel. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools. NDSS 2003.
    • (2003) NDSS
    • Garfinkel, T.1
  • 17
  • 22
    • 85180410443 scopus 로고    scopus 로고
    • Microsoft
    • Microsoft. Retrieving the Properties of a Connection (VBScript). http://msdn.microsoft.com/library/default.asp?url=/library/en-us/ics/ics/retrieving the properties_of_a_connection_vbscript_.asp.
    • Retrieving the Properties of a Connection (VBScript)
  • 25
    • 84878346861 scopus 로고    scopus 로고
    • Improving Host Security with System Call Policies
    • N. Provos. Improving Host Security with System Call Policies. USENIX Security 2003.
    • (2003) USENIX Security
    • Provos, N.1
  • 28
    • 84870638842 scopus 로고    scopus 로고
    • Chapter 15: Mandatory Access Control
    • T. Rhodes. FreeBSD Handbook, Chapter 15: Mandatory Access Control, http://www.freebsd.org/doc/en US.ISO8859-1/books/handbook/mac.htmlciteseer.nj.nec.com/ganesh03peertopeer.html.
    • FreeBSD Handbook
    • Rhodes, T.1
  • 29
    • 38849103391 scopus 로고    scopus 로고
    • Measurement and Analysis of Spyware in a University Environment
    • S. Saroiu, S. D. Gribble, and H. M. Levy. Measurement and Analysis of Spyware in a University Environment. NSDI 2004.
    • (2004) NSDI
    • Saroiu, S.1    Gribble, S. D.2    Levy, H. M.3
  • 30
    • 85180406262 scopus 로고    scopus 로고
    • Ostia: A Delegating Architecture for Secure System Call Interposition
    • M. R. Tal Garfinkel, Ben Pfaff. Ostia: A Delegating Architecture for Secure System Call Interposition. NDSS 2004.
    • (2004) NDSS
    • Tal Garfinkel, M. R.1    Pfaff, Ben2
  • 34
    • 14844302134 scopus 로고    scopus 로고
    • MECA: an Extensible, Expressive System and Language for Statically Checking Security Properties
    • J. Yang, T. Kremenek, Y. Xie, and D. Engler. MECA: an Extensible, Expressive System and Language for Statically Checking Security Properties. ACM CCS 2003.
    • (2003) ACM CCS
    • Yang, J.1    Kremenek, T.2    Xie, Y.3    Engler, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.