메뉴 건너뛰기




Volumn , Issue , 2009, Pages 33-37

The cake is a lie: Privilege rings as a policy resource

Author keywords

Vertical isolation; X86 segmentation

Indexed keywords

COMMODITY SYSTEMS; DESCRIPTORS; KERNEL COMPONENTS; LEVEL PROCESS; MICRO KERNEL; PRACTICAL SOLUTIONS; SINGLE COMPONENTS; VERTICAL ISOLATION; VIRTUALIZATIONS;

EID: 74049099686     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1655148.1655154     Document Type: Conference Paper
Times cited : (5)

References (25)
  • 3
    • 85084162921 scopus 로고    scopus 로고
    • Privtrans: Automatically partitioning programs for privilege separation
    • Berkeley, CA, USA, USENIX Association
    • D. Brumley and D. Song. Privtrans: automatically partitioning programs for privilege separation. In USENIX Security '04, pages 5-5, Berkeley, CA, USA, 2004. USENIX Association.
    • (2004) USENIX Security '04 , pp. 5-5
    • Brumley, D.1    Song, D.2
  • 4
    • 74049094918 scopus 로고
    • A unified model and implementation for interprocess communication in a multiprocessor environment
    • G. W. Cox, W. M. Corwin, K. K. Lai, and F. J. Pollack. A unified model and implementation for interprocess communication in a multiprocessor environment. SIGOPS Oper. Syst. Rev., 15(5):125-126, 1981.
    • (1981) SIGOPS Oper. Syst. Rev , vol.15 , Issue.5 , pp. 125-126
    • Cox, G.W.1    Corwin, W.M.2    Lai, K.K.3    Pollack, F.J.4
  • 5
    • 0016949746 scopus 로고
    • A lattice model of secure information flow
    • D. E. Denning. A lattice model of secure information flow. Commun. ACM, 19(5):236-243, 1976.
    • (1976) Commun. ACM , vol.19 , Issue.5 , pp. 236-243
    • Denning, D.E.1
  • 6
    • 84883516225 scopus 로고
    • Exokernel: An Operating System Architecture for Application-Level Resource Management
    • D. R. Engler, M. F. Kaashoek, and J. OâǍŹtoole. Exokernel: An Operating System Architecture for Application-Level Resource Management. In SOSP '95, pages 251-266, 1995.
    • (1995) SOSP '95 , pp. 251-266
    • Engler, D.R.1    Kaashoek, M.F.2    OâǍŹtoole, J.3
  • 7
    • 84858758065 scopus 로고    scopus 로고
    • Vx32: Lightweight user-level sandboxing on the x86
    • Berkeley, CA, USA, USENIX Association
    • B. Ford and R. Cox. Vx32: lightweight user-level sandboxing on the x86. In USENIX ATC '08, pages 293-306, Berkeley, CA, USA, 2008. USENIX Association.
    • (2008) USENIX ATC '08 , pp. 293-306
    • Ford, B.1    Cox, R.2
  • 9
    • 70349256823 scopus 로고    scopus 로고
    • Security and Performance Trade-Offs in I/O Operations for Virtual Machine Monitors
    • RC24500 W0802-069, February
    • P. A. Karger and D. R. Safford. Security and Performance Trade-Offs in I/O Operations for Virtual Machine Monitors. In IBM Research Technical Report RC24500 (W0802-069), February 2008.
    • (2008) IBM Research Technical Report
    • Karger, P.A.1    Safford, D.R.2
  • 10
    • 33646010754 scopus 로고    scopus 로고
    • Privman: A Library for Partitioning Applications
    • Berkeley, CA, USA, USENIX Association
    • D. Kilpatrick. Privman: A Library for Partitioning Applications. In USENIX Technical Conference, FREENIX Track, Berkeley, CA, USA, 2003. USENIX Association.
    • (2003) USENIX Technical Conference, FREENIX Track
    • Kilpatrick, D.1
  • 11
    • 74049093328 scopus 로고    scopus 로고
    • S. Microsystems. Consolidating applications with Solaris containers. 2004.
    • S. Microsystems. Consolidating applications with Solaris containers. 2004.
  • 12
    • 0022216543 scopus 로고
    • Architecture of the Symbolics 3600
    • D. A. Moon. Architecture of the Symbolics 3600. SIGARCH Comput. Archit. News, 13(3):76-83, 1985.
    • (1985) SIGARCH Comput. Archit. News , vol.13 , Issue.3 , pp. 76-83
    • Moon, D.A.1
  • 13
    • 84978437417 scopus 로고    scopus 로고
    • The Design and Implementation of Zap: A System for Migrating Computing Environments
    • Boston, MA, Dec
    • S. Osman, D. Subhraveti, G. Su, and J. Nieh. The Design and Implementation of Zap: A System for Migrating Computing Environments. In OSDI '02, pages 361-376, Boston, MA, Dec. 2002.
    • (2002) OSDI '02 , pp. 361-376
    • Osman, S.1    Subhraveti, D.2    Su, G.3    Nieh, J.4
  • 16
    • 74049107467 scopus 로고    scopus 로고
    • TIARA: Trust Management, Intrusion-tolerance, Accountability, and Reconstitution Architecture
    • Technical Report MIT-CSAIL-TR-2007-028, MIT, May
    • H. Shrobe, T. Knight, and A. de Hon. TIARA: Trust Management, Intrusion-tolerance, Accountability, and Reconstitution Architecture. Technical Report MIT-CSAIL-TR-2007-028, MIT, May 2007.
    • (2007)
    • Shrobe, H.1    Knight, T.2    de Hon, A.3
  • 17
    • 34548029519 scopus 로고    scopus 로고
    • Container-based operating system virtualization: A scalable, high-performance alternative to hypervisors
    • S. Soltesz, H. P̈otzl, M. E. Fiuczynski, A. Bavier, and L. Peterson. Container-based operating system virtualization: a scalable, high-performance alternative to hypervisors. SIGOPS Oper. Syst. Rev., 41(3):275-287, 2007.
    • (2007) SIGOPS Oper. Syst. Rev , vol.41 , Issue.3 , pp. 275-287
    • Soltesz, S.1    P̈otzl, H.2    Fiuczynski, M.E.3    Bavier, A.4    Peterson, L.5
  • 20
    • 16644400693 scopus 로고    scopus 로고
    • Improving the reliability of commodity operating systems
    • M. M. Swift, B. N. Bershad, and H. M. Levy. Improving the reliability of commodity operating systems. ACM Trans. Comput. Syst., 23(1):77-110, 2005.
    • (2005) ACM Trans. Comput. Syst , vol.23 , Issue.1 , pp. 77-110
    • Swift, M.M.1    Bershad, B.N.2    Levy, H.M.3
  • 22
    • 0036957412 scopus 로고    scopus 로고
    • Mondrian memory protection
    • New York, NY, USA, ACM Press
    • E. Witchel, J. Cates, and K. Asanovic. Mondrian memory protection. In ASPLOS-X: 2002, volume 37, New York, NY, USA, 2002. ACM Press.
    • (2002) ASPLOS-X: 2002 , vol.37
    • Witchel, E.1    Cates, J.2    Asanovic, K.3
  • 23
    • 33845435188 scopus 로고    scopus 로고
    • Mondrix: Memory isolation for linux using mondriaan memory protection
    • E. Witchel, J. Rhee, and K. Asanović. Mondrix: memory isolation for linux using mondriaan memory protection. SIGOPS Oper. Syst. Rev., 39(5):31-44, 2005.
    • (2005) SIGOPS Oper. Syst. Rev , vol.39 , Issue.5 , pp. 31-44
    • Witchel, E.1    Rhee, J.2    Asanović, K.3
  • 24
    • 84888352157 scopus 로고    scopus 로고
    • Making information flow explicit in HiStar
    • Berkeley, CA, USA, USENIX Association
    • N. Zeldovich, S. Boyd-Wickizer, E. Kohler, and D. Mazìeres. Making information flow explicit in HiStar. In OSDI '06, Berkeley, CA, USA, 2006. USENIX Association.
    • (2006) OSDI '06
    • Zeldovich, N.1    Boyd-Wickizer, S.2    Kohler, E.3    Mazìeres, D.4
  • 25
    • 77954997106 scopus 로고    scopus 로고
    • Hardware Enforcement of Application Security Policies Using Tagged Memory
    • Berkeley, CA, USA, USENIX Association
    • N. Zeldovich, H. Kannan, M. Dalton, and C. Kozyrakis. Hardware Enforcement of Application Security Policies Using Tagged Memory. In OSDI '08, Berkeley, CA, USA, 2008. USENIX Association.
    • (2008) OSDI '08
    • Zeldovich, N.1    Kannan, H.2    Dalton, M.3    Kozyrakis, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.