메뉴 건너뛰기




Volumn , Issue , 2009, Pages 11-18

Hardware-enforced fine-grained isolation of untrusted code

Author keywords

Architectural support for security; Fine grained protection; Isolation; Memory protection; Software security

Indexed keywords

ARCHITECTURAL SUPPORT; BOOKKEEPING DATA; C FUNCTIONS; DENIAL OF SERVICE; MEMORY PROTECTION; OPEN SOURCE PROJECTS; PLUG-INS; SOFTWARE SECURITY; UNTRUSTED CODE; WORST CASE;

EID: 74049130873     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1655077.1655082     Document Type: Conference Paper
Times cited : (4)

References (27)
  • 2
    • 0036469652 scopus 로고    scopus 로고
    • Simplescalar: An infrastructure for computer system modeling
    • Feb
    • T. Austin, E. Larson, and D. Ernst. Simplescalar: An infrastructure for computer system modeling. Computer, Feb 2002.
    • (2002) Computer
    • Austin, T.1    Larson, E.2    Ernst, D.3
  • 8
    • 38349068551 scopus 로고    scopus 로고
    • Singularity: Rethinking the software stack
    • Apr
    • G. Hunt and J. Larus. Singularity: Rethinking the software stack. ACM SIGOPS Operating Systems Review, 41(2):37-49, Apr. 2007.
    • (2007) ACM SIGOPS Operating Systems Review , vol.41 , Issue.2 , pp. 37-49
    • Hunt, G.1    Larus, J.2
  • 14
    • 74049156071 scopus 로고    scopus 로고
    • Data-intensive system benchmark suite analysis and specification
    • J. Manke and J. Wu. Data-intensive system benchmark suite analysis and specification. Atlantic Aerospace Electronics Corp, 1999.
    • (1999) Atlantic Aerospace Electronics Corp
    • Manke, J.1    Wu, J.2
  • 15
    • 74049129086 scopus 로고    scopus 로고
    • Mozilla Corporation
    • Mozilla Corporation. Firefox add-ons. https://addons.mozilla.org/, 2009.
    • (2009) Firefox add-ons
  • 16
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • J. Saltzer and M. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.1    Schroeder, M.2
  • 21
    • 74049091918 scopus 로고    scopus 로고
    • The Apache Software Foundation. Apache httpd modules. http://httpd.apache.org/modules/, 2009.
    • (2009) Apache httpd modules
  • 22
    • 67249158178 scopus 로고    scopus 로고
    • Symantec internet security threat report: Trends for
    • January, June, Tech. report, Symantec Inc
    • D. Turner. Symantec internet security threat report: Trends for January - June 2007. Tech. report, Symantec Inc., 2007.
    • (2007) , pp. 2007
    • Turner, D.1
  • 23
    • 0242671076 scopus 로고    scopus 로고
    • Janus: An approach for confinement of untrusted applications
    • Technical Report CSD-99-1056, UC Berkeley
    • D. Wagner. Janus: An approach for confinement of untrusted applications. Technical Report CSD-99-1056, UC Berkeley, 1999.
    • (1999)
    • Wagner, D.1
  • 25
    • 33845435188 scopus 로고    scopus 로고
    • Mondrix: Memory isolation for linux using mondriaan memory protection
    • E. Witchel, J. Rhee, and K. Asanovíc. Mondrix: memory isolation for linux using mondriaan memory protection. SIGOPS Operating Systems Review, 39(5):31-44, 2005.
    • (2005) SIGOPS Operating Systems Review , vol.39 , Issue.5 , pp. 31-44
    • Witchel, E.1    Rhee, J.2    Asanovíc, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.