메뉴 건너뛰기




Volumn , Issue , 2011, Pages 329-344

TxBox: Building secure, efficient sandboxes with system transactions

Author keywords

[No Author keywords available]

Indexed keywords

ANTI-VIRUS SCANNING; AUTOMATIC RECOVERY; MULTIPLE SYSTEMS; PERFORMANCE GAIN; SANDBOXING; SECURITY CHECKS; SECURITY POLICY; SYSTEM CALLS;

EID: 80051954621     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2011.33     Document Type: Conference Paper
Times cited : (18)

References (63)
  • 2
    • 85084161234 scopus 로고    scopus 로고
    • MAPbox: Using parameterized behavior classes to confine applications
    • A. Acharya and M. Raje. MAPbox: Using parameterized behavior classes to confine applications. In USENIX Security, 2000.
    • (2000) USENIX Security
    • Acharya, A.1    Raje, M.2
  • 3
    • 85084161168 scopus 로고
    • TRON: Process-specific file protection for the UNIX operating system
    • A. Berman, V. Bourassa, and E. Selberg. TRON: Process-specific file protection for the UNIX operating system. In USENIX Winter, 1995.
    • (1995) USENIX Winter
    • Berman, A.1    Bourassa, V.2    Selberg, E.3
  • 4
    • 84867854789 scopus 로고    scopus 로고
    • REMUS: A security-enhanced operating system
    • M. Bernaschi, E. Gabrielli, and L. Mancini. REMUS: A security-enhanced operating system. TISSEC, 5(1), 2002.
    • (2002) TISSEC , vol.5 , Issue.1
    • Bernaschi, M.1    Gabrielli, E.2    Mancini, L.3
  • 6
    • 70349275455 scopus 로고    scopus 로고
    • Enforcing authorization policies using transactional memory introspection
    • A. Birgisson, M. Dhawan, U. Erlingsson, V. Ganapathy, and L. Iftode. Enforcing authorization policies using transactional memory introspection. In CCS, 2008.
    • (2008) CCS
    • Birgisson, A.1    Dhawan, M.2    Erlingsson, U.3    Ganapathy, V.4    Iftode, L.5
  • 8
    • 57749185043 scopus 로고    scopus 로고
    • Thread-safe dynamic binary translation using transactional memory
    • J. Chung, M. Dalton, H. Kannan, and C. Kozyrakis. Thread-safe dynamic binary translation using transactional memory. In HPCA, 2008.
    • (2008) HPCA
    • Chung, J.1    Dalton, M.2    Kannan, H.3    Kozyrakis, C.4
  • 9
    • 85177689807 scopus 로고    scopus 로고
    • Clam AntiVirus. http://www.clamav.net/lang/en/.
  • 10
    • 0023266943 scopus 로고
    • A comparison of commercial and military computer security policies
    • D. Clark and D. Wilson. A comparison of commercial and military computer security policies. In S&P, 1987.
    • (1987) S&P
    • Clark, D.1    Wilson, D.2
  • 13
    • 78649997202 scopus 로고    scopus 로고
    • Leveraging legacy code to deploy desktop applications on the web
    • J. Douceur, J. Elson, J. Howell, and J. Lorch. Leveraging legacy code to deploy desktop applications on the web. In OSDI, 2008.
    • (2008) OSDI
    • Douceur, J.1    Elson, J.2    Howell, J.3    Lorch, J.4
  • 14
    • 11844249640 scopus 로고    scopus 로고
    • ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
    • G. Dunlap, S. King, S. Cinar, M. Basrai, and P. Chen. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In OSDI, 2002.
    • (2002) OSDI
    • Dunlap, G.1    King, S.2    Cinar, S.3    Basrai, M.4    Chen, P.5
  • 16
    • 0033489650 scopus 로고    scopus 로고
    • SASI enforcement of security policies: A retrospective
    • U. Erlingsson and F. Schneider. SASI enforcement of security policies: A retrospective. In NSPW, 1999.
    • (1999) NSPW
    • Erlingsson, U.1    Schneider, F.2
  • 18
    • 84858758065 scopus 로고    scopus 로고
    • Vx32: Lightweight userlevel sandboxing on the x86
    • B. Ford and R. Cox. Vx32: Lightweight userlevel sandboxing on the x86. In USENIX ATC, 2008.
    • (2008) USENIX ATC
    • Ford, B.1    Cox, R.2
  • 19
    • 0032641892 scopus 로고    scopus 로고
    • Hardening COTS software with generic software wrappers
    • T. Fraser, L. Badger, and M. Feldman. Hardening COTS software with generic software wrappers. In S&P, 1999.
    • (1999) S&P
    • Fraser, T.1    Badger, L.2    Feldman, M.3
  • 20
    • 14844297052 scopus 로고    scopus 로고
    • Gray-box extraction of execution graphs for anomaly detection
    • D. Gao, M. Reiter, and D. Song. Gray-box extraction of execution graphs for anomaly detection. In CCS, 2004.
    • (2004) CCS
    • Gao, D.1    Reiter, M.2    Song, D.3
  • 21
    • 85180527583 scopus 로고    scopus 로고
    • Traps and pitfalls: Practical problems in system call interposition based security tools
    • T. Garfinkel. Traps and pitfalls: Practical problems in system call interposition based security tools. In NDSS, 2003.
    • (2003) NDSS
    • Garfinkel, T.1
  • 22
    • 53349091372 scopus 로고    scopus 로고
    • Compatibility is not transparency: Vmm detection myths and realities
    • T. Garfinkel, K. Adams, A. Warfield, and J. Franklin. Compatibility is not transparency: VMM detection myths and realities. In HotOS, 2007.
    • (2007) HotOS
    • Garfinkel, T.1    Adams, K.2    Warfield, A.3    Franklin, J.4
  • 23
  • 24
    • 85180406262 scopus 로고    scopus 로고
    • Ostia: A delegating architecture for secure system call interposition
    • T. Garfinkel, B. Pfaff, and M. Rosenblum. Ostia: A delegating architecture for secure system call interposition. In NDSS, 2004.
    • (2004) NDSS
    • Garfinkel, T.1    Pfaff, B.2    Rosenblum, M.3
  • 25
    • 85080362568 scopus 로고    scopus 로고
    • A virtual machine introspection based architecture for intrusion detection
    • T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In NDSS, 2003.
    • (2003) NDSS
    • Garfinkel, T.1    Rosenblum, M.2
  • 26
    • 33846312311 scopus 로고    scopus 로고
    • Efficient context-sensitive intrusion detection
    • J. Giffin, S. Jha, and B. Miller. Efficient context-sensitive intrusion detection. In NDSS, 2004.
    • (2004) NDSS
    • Giffin, J.1    Jha, S.2    Miller, B.3
  • 27
    • 85084162735 scopus 로고    scopus 로고
    • A secure environment for untrusted helper applications: Confining the wily hacker
    • I. Goldberg, D. Wagner, R. Thomas, and E. Brewer. A secure environment for untrusted helper applications: Confining the wily hacker. In USENIX Security, 1996.
    • (1996) USENIX Security
    • Goldberg, I.1    Wagner, D.2    Thomas, R.3    Brewer, E.4
  • 28
    • 84870849340 scopus 로고    scopus 로고
    • Google. V8 benchmark suite. http://v8.googlecode.com/svn/data/benchmarks/ v2/.
    • V8 Benchmark Suite
  • 29
    • 77954917730 scopus 로고    scopus 로고
    • Transactional memory with data invariants
    • T. Harris and S. Peyton-Jones. Transactional memory with data invariants. In TRANSACT, 2006.
    • (2006) TRANSACT
    • Harris, T.1    Peyton-Jones, S.2
  • 31
    • 0032313923 scopus 로고    scopus 로고
    • Intrusion detection using sequences of system calls
    • S. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. J. Comput. Secur., 6(3), 1998.
    • (1998) J. Comput. Secur. , vol.6 , Issue.3
    • Hofmeyr, S.1    Forrest, S.2    Somayaji, A.3
  • 32
    • 85180753454 scopus 로고    scopus 로고
    • User-level infrastructure for system call interposition: A platform for intrusion detection and confinement
    • K. Jain and R. Sekar. User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. In NDSS, 2000.
    • (2000) NDSS
    • Jain, K.1    Sekar, R.2
  • 35
    • 0015672289 scopus 로고
    • A note on the confinement problem
    • B. Lampson. A note on the confinement problem. CACM, 16(10), 1973.
    • (1973) CACM , vol.16 , Issue.10
    • Lampson, B.1
  • 38
    • 59249094964 scopus 로고    scopus 로고
    • From STEM to SEAD: Speculative execution for automated defense
    • M. Locasto, A. Stavrou, G. Cretu, and A. Keromytis. From STEM to SEAD: Speculative execution for automated defense. In USENIX ATC, 2007.
    • (2007) USENIX ATC
    • Locasto, M.1    Stavrou, A.2    Cretu, G.3    Keromytis, A.4
  • 40
    • 77957797161 scopus 로고    scopus 로고
    • Parallelizing security checks on commodity hardware
    • E. Nightingale, D. Peek, P. Chen, and J. Flinn. Parallelizing security checks on commodity hardware. In ASPLOS, 2008.
    • (2008) ASPLOS
    • Nightingale, E.1    Peek, D.2    Chen, P.3    Flinn, J.4
  • 44
    • 50249114395 scopus 로고    scopus 로고
    • Automated detection of persistent kernel control-flow attacks
    • N. Petroni and M. Hicks. Automated detection of persistent kernel control-flow attacks. In CCS, 2007.
    • (2007) CCS
    • Petroni, N.1    Hicks, M.2
  • 45
    • 85177636265 scopus 로고    scopus 로고
    • Hard link vulnerability. http://plash.beasts.org/wiki/PlashIssues/ HardLinkVulnerability?highlight=%28PlashIssues/%29|%28CategoryPostponed%29.
    • Hard Link Vulnerability
  • 46
    • 85177641788 scopus 로고    scopus 로고
    • open() with O.CLOEXEC returns an error
    • open() with O.CLOEXEC returns an error. http://plash.beasts.org/wiki/ PlashIssues/CloexecOpenFails?highlight=%28PlashIssues/ %29|%28CategoryPostponed%29.
  • 47
  • 49
    • 84878346861 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • N. Provos. Improving host security with system call policies. In USENIX Security, 2003.
    • (2003) USENIX Security
    • Provos, N.1
  • 50
    • 85084162270 scopus 로고    scopus 로고
    • Design and implementation of a TCG-based integrity measurement architecture
    • R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In USENIX Security, 2004.
    • (2004) USENIX Security
    • Sailer, R.1    Zhang, X.2    Jaeger, T.3    Van Doorn, L.4
  • 51
    • 85177683123 scopus 로고    scopus 로고
    • M. Seaborn. Plash. http://plash.beasts.org/wiki/.
    • Seaborn, M.1
  • 52
    • 0034829697 scopus 로고    scopus 로고
    • A fast automaton-based method for detecting anomalous program behaviors
    • R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A fast automaton-based method for detecting anomalous program behaviors. In S&P, 2001.
    • (2001) S&P
    • Sekar, R.1    Bendre, M.2    Dhurjati, D.3    Bollineni, P.4
  • 53
    • 85084100576 scopus 로고    scopus 로고
    • Dealing with disaster: Surviving misbehaved kernel extensions
    • M. Seltzer, Y. Endo, C. Small, and K. Smith. Dealing with disaster: Surviving misbehaved kernel extensions. In OSDI, 1996.
    • (1996) OSDI
    • Seltzer, M.1    Endo, Y.2    Small, C.3    Smith, K.4
  • 54
    • 33646001408 scopus 로고    scopus 로고
    • Execution transactions for defending against software failures: Use and evaluation
    • S. Sidiroglou and A. Keromytis. Execution transactions for defending against software failures: use and evaluation. Int. J. Inf. Secur, 5(2), 2006.
    • (2006) Int. J. Inf. Secur , vol.5 , Issue.2
    • Sidiroglou, S.1    Keromytis, A.2
  • 55
    • 84969564072 scopus 로고    scopus 로고
    • One-way isolation: An effective approach for realizing safe execution environments
    • W. Sun, Z. Liang, R. Sekar, and V. Venkatakrishnan. One-way isolation: An effective approach for realizing safe execution environments. In NDSS, 2005.
    • (2005) NDSS
    • Sun, W.1    Liang, Z.2    Sekar, R.3    Venkatakrishnan, V.4
  • 56
    • 0034836394 scopus 로고    scopus 로고
    • Intrusion detection via static analysis
    • D. Wagner and D. Dean. Intrusion detection via static analysis. In S&P, 2001.
    • (2001) S&P
    • Wagner, D.1    Dean, D.2
  • 57
    • 74049120743 scopus 로고    scopus 로고
    • Countering kernel rootkits with lightweight hook protection
    • Z. Wang, X. Jiang, W Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In CCS, 2009.
    • (2009) CCS
    • Wang, Z.1    Jiang, X.2    Cui, W.3    Ning, P.4
  • 58
    • 85084162296 scopus 로고    scopus 로고
    • Exploiting concurrency vulnerabilities in system call wrappers
    • R. Watson. Exploiting concurrency vulnerabilities in system call wrappers. In WOOT, 2007.
    • (2007) WOOT
    • Watson, R.1
  • 60
    • 0037636215 scopus 로고    scopus 로고
    • Intrusion detection using variable-length audit trail patterns
    • A. Wespi, M. Dacier, and H. Debar. Intrusion detection using variable-length audit trail patterns. In RAID, 2000.
    • (2000) RAID
    • Wespi, A.1    Dacier, M.2    Debar, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.