메뉴 건너뛰기




Volumn , Issue , 2009, Pages 33-45

The user is not the enemy: Fighting malware by tracking user intentions

Author keywords

Access control; Security policies; User intent

Indexed keywords

ACCESS CONTROL DECISIONS; ACCESS CONTROL POLICIES; MALWARE MITIGATION; MALWARES; NEW APPROACHES; SINGLE-USER SYSTEM; SYSTEM DAMAGE; USER ACTION; USER BEHAVIORS; USER INTENTION;

EID: 77950555884     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1595676.1595683     Document Type: Conference Paper
Times cited : (14)

References (47)
  • 10
    • 0016949746 scopus 로고
    • A Lattice Model of Secure Information Flow
    • May
    • Dorothy E. Denning. A Lattice Model of Secure Information Flow. Communications of the ACM, May 1976: 236-243.
    • (1976) Communications of the ACM , pp. 236-243
    • Denning, D.E.1
  • 23
    • 50249133982 scopus 로고    scopus 로고
    • Microsoft Corporation. Microsoft Virtual PC. 2007. http://www.microsoft. com/windowsxp/virtualpc/
    • (2007) Microsoft Virtual PC
  • 25
    • 33845953872 scopus 로고    scopus 로고
    • National Security Administration. Security-Enhanced Linux. 2007. http://www.nsa.gov/selinux/.
    • (2007) Security-Enhanced Linux
  • 27
    • 77950591412 scopus 로고    scopus 로고
    • Novell Corporation. AppArmor. http://www.novell.com/linux/security/ apparmor/.
    • AppArmor
  • 31
    • 77954747528 scopus 로고    scopus 로고
    • Sysinternals. Rootkit Revealer. 2006. http://www.sysinternals.com/ Utilities/RootkitRevealer.
    • (2006) Rootkit Revealer
  • 35
    • 77950578684 scopus 로고    scopus 로고
    • Sun Microsystems. Java Security Overview. 2007. http://java.sun.com/ javase/6/docs/technotes/guides.
    • (2007) Java Security Overview
  • 36
  • 38
    • 77950575412 scopus 로고    scopus 로고
    • The Tripwire Project. Tripwire host-based IDS. 2007. http://sourceforge. net/projects/tripwire/.
    • (2007) Tripwire Host-based IDS.
  • 39
    • 33748055425 scopus 로고    scopus 로고
    • Towards Reasonability Properties for Access Control Policy Languages
    • Michael C. Tschantz and Shriram Krishnamurthi. Towards Reasonability Properties for Access Control Policy Languages. In Proc. ACM SACMAT. 2006.
    • Proc. ACM SACMAT. 2006
    • Tschantz, M.C.1    Krishnamurthi, S.2
  • 41
    • 77950567822 scopus 로고    scopus 로고
    • VMWare Corporation. VMWare. 2007. http://www.vmware.com.
    • (2007) VMWare
  • 44
    • 77950551459 scopus 로고    scopus 로고
    • Securing the User Input Path on NGSCB Systems
    • David R. Wooten. Securing the User Input Path On NGSCB Systems. In Microsoft WinHEC. 2004. http://download.microsoft.com/download/1/8/f/18f8cee2- 0b64-41f2893da6f2295b40c8/TW04055-WINHEC2004.ppt.
    • Microsoft WinHEC. 2004
    • Wooten, D.R.1
  • 45
    • 85038810709 scopus 로고    scopus 로고
    • Taint-enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks
    • Wei Xu, Sandeep Bhatkar, and R. Sekar. Taint-enhanced Policy Enforcement: A Practical Approach to Defeat a Wide Range of Attacks. In Proc. USENIX Security Symposium. 2006.
    • Proc. USENIX Security Symposium. 2006
    • Xu, W.1    Bhatkar, S.2    Sekar, R.3
  • 46


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.