-
2
-
-
85084161234
-
MAPbox: Using parameterized behavior classes to confine applications
-
A. Acharya and M. Raje. MAPbox: Using parameterized behavior classes to confine applications. In USENIX Security, 2000.
-
(2000)
USENIX Security
-
-
Acharya, A.1
Raje, M.2
-
3
-
-
85084161168
-
TRON: Process-specific file protection for the UNIX operating system
-
A. Berman, V. Bourassa, and E. Selberg. TRON: Process-specific file protection for the UNIX operating system. In USENIX Winter, 1995.
-
(1995)
USENIX Winter
-
-
Berman, A.1
Bourassa, V.2
Selberg, E.3
-
4
-
-
84867854789
-
REMUS: A security-enhanced operating system
-
M. Bernaschi, E. Gabrielli, and L. Mancini. REMUS: A security-enhanced operating system. TISSEC, 5(1), 2002.
-
(2002)
TISSEC
, vol.5
, Issue.1
-
-
Bernaschi, M.1
Gabrielli, E.2
Mancini, L.3
-
6
-
-
70349275455
-
Enforcing authorization policies using transactional memory introspection
-
A. Birgisson, M. Dhawan, U. Erlingsson, V. Ganapathy, and L. Iftode. Enforcing authorization policies using transactional memory introspection. In CCS, 2008.
-
(2008)
CCS
-
-
Birgisson, A.1
Dhawan, M.2
Erlingsson, U.3
Ganapathy, V.4
Iftode, L.5
-
8
-
-
57749185043
-
Thread-safe dynamic binary translation using transactional memory
-
J. Chung, M. Dalton, H. Kannan, and C. Kozyrakis. Thread-safe dynamic binary translation using transactional memory. In HPCA, 2008.
-
(2008)
HPCA
-
-
Chung, J.1
Dalton, M.2
Kannan, H.3
Kozyrakis, C.4
-
9
-
-
85177689807
-
-
Clam AntiVirus. http://www.clamav.net/lang/en/.
-
-
-
-
10
-
-
0023266943
-
A comparison of commercial and military computer security policies
-
D. Clark and D. Wilson. A comparison of commercial and military computer security policies. In S&P, 1987.
-
(1987)
S&P
-
-
Clark, D.1
Wilson, D.2
-
11
-
-
10044275460
-
SubDomain: Parsimonious server security
-
C. Cowan, S. Beattie, G. Kroah-Hartman, C. Pu, P. Wagle, and V. Gligor. SubDomain: Parsimonious server security. In LISA, 2000.
-
(2000)
LISA
-
-
Cowan, C.1
Beattie, S.2
Kroah-Hartman, G.3
Pu, C.4
Wagle, P.5
Gligor, V.6
-
13
-
-
78649997202
-
Leveraging legacy code to deploy desktop applications on the web
-
J. Douceur, J. Elson, J. Howell, and J. Lorch. Leveraging legacy code to deploy desktop applications on the web. In OSDI, 2008.
-
(2008)
OSDI
-
-
Douceur, J.1
Elson, J.2
Howell, J.3
Lorch, J.4
-
14
-
-
11844249640
-
ReVirt: Enabling intrusion analysis through virtual-machine logging and replay
-
G. Dunlap, S. King, S. Cinar, M. Basrai, and P. Chen. ReVirt: Enabling intrusion analysis through virtual-machine logging and replay. In OSDI, 2002.
-
(2002)
OSDI
-
-
Dunlap, G.1
King, S.2
Cinar, S.3
Basrai, M.4
Chen, P.5
-
15
-
-
84885664275
-
Labels and event processes in the asbestos operating system
-
P. Efstathopoulos, M. Krohn, S. VanDeBogart, C. Frey, D. Ziegler, E. Kohler, D. Mazières, F. Kaashoek, and R. Morris. Labels and event processes in the Asbestos operating system. In SOSP, 2005.
-
(2005)
SOSP
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
16
-
-
0033489650
-
SASI enforcement of security policies: A retrospective
-
U. Erlingsson and F. Schneider. SASI enforcement of security policies: A retrospective. In NSPW, 1999.
-
(1999)
NSPW
-
-
Erlingsson, U.1
Schneider, F.2
-
17
-
-
0038825045
-
Anomaly detection using call stack information
-
H. Feng, O. Kolesnikov, P. Fogla, W. Lee, and W. Gong. Anomaly detection using call stack information. In S&P, 2003.
-
(2003)
S&P
-
-
Feng, H.1
Kolesnikov, O.2
Fogla, P.3
Lee, W.4
Gong, W.5
-
18
-
-
84858758065
-
Vx32: Lightweight userlevel sandboxing on the x86
-
B. Ford and R. Cox. Vx32: Lightweight userlevel sandboxing on the x86. In USENIX ATC, 2008.
-
(2008)
USENIX ATC
-
-
Ford, B.1
Cox, R.2
-
19
-
-
0032641892
-
Hardening COTS software with generic software wrappers
-
T. Fraser, L. Badger, and M. Feldman. Hardening COTS software with generic software wrappers. In S&P, 1999.
-
(1999)
S&P
-
-
Fraser, T.1
Badger, L.2
Feldman, M.3
-
20
-
-
14844297052
-
Gray-box extraction of execution graphs for anomaly detection
-
D. Gao, M. Reiter, and D. Song. Gray-box extraction of execution graphs for anomaly detection. In CCS, 2004.
-
(2004)
CCS
-
-
Gao, D.1
Reiter, M.2
Song, D.3
-
21
-
-
85180527583
-
Traps and pitfalls: Practical problems in system call interposition based security tools
-
T. Garfinkel. Traps and pitfalls: Practical problems in system call interposition based security tools. In NDSS, 2003.
-
(2003)
NDSS
-
-
Garfinkel, T.1
-
22
-
-
53349091372
-
Compatibility is not transparency: Vmm detection myths and realities
-
T. Garfinkel, K. Adams, A. Warfield, and J. Franklin. Compatibility is not transparency: VMM detection myths and realities. In HotOS, 2007.
-
(2007)
HotOS
-
-
Garfinkel, T.1
Adams, K.2
Warfield, A.3
Franklin, J.4
-
23
-
-
4444318660
-
Terra: A virtual machine-based platform for trusted computing
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: A virtual machine-based platform for trusted computing. In SOSP, 2003.
-
(2003)
SOSP
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
24
-
-
85180406262
-
Ostia: A delegating architecture for secure system call interposition
-
T. Garfinkel, B. Pfaff, and M. Rosenblum. Ostia: A delegating architecture for secure system call interposition. In NDSS, 2004.
-
(2004)
NDSS
-
-
Garfinkel, T.1
Pfaff, B.2
Rosenblum, M.3
-
25
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
T. Garfinkel and M. Rosenblum. A virtual machine introspection based architecture for intrusion detection. In NDSS, 2003.
-
(2003)
NDSS
-
-
Garfinkel, T.1
Rosenblum, M.2
-
26
-
-
33846312311
-
Efficient context-sensitive intrusion detection
-
J. Giffin, S. Jha, and B. Miller. Efficient context-sensitive intrusion detection. In NDSS, 2004.
-
(2004)
NDSS
-
-
Giffin, J.1
Jha, S.2
Miller, B.3
-
27
-
-
85084162735
-
A secure environment for untrusted helper applications: Confining the wily hacker
-
I. Goldberg, D. Wagner, R. Thomas, and E. Brewer. A secure environment for untrusted helper applications: Confining the wily hacker. In USENIX Security, 1996.
-
(1996)
USENIX Security
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.4
-
28
-
-
84870849340
-
-
Google. V8 benchmark suite. http://v8.googlecode.com/svn/data/benchmarks/ v2/.
-
V8 Benchmark Suite
-
-
-
29
-
-
77954917730
-
Transactional memory with data invariants
-
T. Harris and S. Peyton-Jones. Transactional memory with data invariants. In TRANSACT, 2006.
-
(2006)
TRANSACT
-
-
Harris, T.1
Peyton-Jones, S.2
-
30
-
-
85177680643
-
A case for deconstructing hardware transactional memory
-
University of Wisconsin-Madison
-
M. Hill, D. Hower, K. Moore, M. Swift, H. Volos, and D. Wood. A case for deconstructing hardware transactional memory. Technical Report CS-TR-2007-1594, Dept. of Computer Sciences, University of Wisconsin-Madison, 2007.
-
(2007)
Technical Report CS-TR-2007-1594, Dept. of Computer Sciences
-
-
Hill, M.1
Hower, D.2
Moore, K.3
Swift, M.4
Volos, H.5
Wood, D.6
-
31
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. J. Comput. Secur., 6(3), 1998.
-
(1998)
J. Comput. Secur.
, vol.6
, Issue.3
-
-
Hofmeyr, S.1
Forrest, S.2
Somayaji, A.3
-
32
-
-
85180753454
-
User-level infrastructure for system call interposition: A platform for intrusion detection and confinement
-
K. Jain and R. Sekar. User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. In NDSS, 2000.
-
(2000)
NDSS
-
-
Jain, K.1
Sekar, R.2
-
33
-
-
85076206522
-
Effective and efficient malware detection at the end host
-
C. Kolbitsch, P. Milani, C. Kruegel, E. Kirda, X. Zhou, and X. Wang. Effective and efficient malware detection at the end host. In USENIX Security, 2009.
-
(2009)
USENIX Security
-
-
Kolbitsch, C.1
Milani, P.2
Kruegel, C.3
Kirda, E.4
Zhou, X.5
Wang, X.6
-
34
-
-
57749192483
-
Information flow control for standard OS abstractions
-
M. Krohn, A. Yip, M. Brodsky, N. Cliffer, F. Kaashoek, E. Kohler, and R. Morris. Information flow control for standard OS abstractions. In SOSP, 2007.
-
(2007)
SOSP
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, F.5
Kohler, E.6
Morris, R.7
-
35
-
-
0015672289
-
A note on the confinement problem
-
B. Lampson. A note on the confinement problem. CACM, 16(10), 1973.
-
(1973)
CACM
, vol.16
, Issue.10
-
-
Lampson, B.1
-
36
-
-
78650024495
-
AccessMiner: Using system-centric models for malware protection
-
A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu, and E. Kirda. AccessMiner: Using system-centric models for malware protection. In CCS, 2010.
-
(2010)
CCS
-
-
Lanzi, A.1
Balzarotti, D.2
Kruegel, C.3
Christodorescu, M.4
Kirda, E.5
-
44
-
-
50249114395
-
Automated detection of persistent kernel control-flow attacks
-
N. Petroni and M. Hicks. Automated detection of persistent kernel control-flow attacks. In CCS, 2007.
-
(2007)
CCS
-
-
Petroni, N.1
Hicks, M.2
-
45
-
-
85177636265
-
-
Hard link vulnerability. http://plash.beasts.org/wiki/PlashIssues/ HardLinkVulnerability?highlight=%28PlashIssues/%29|%28CategoryPostponed%29.
-
Hard Link Vulnerability
-
-
-
46
-
-
85177641788
-
-
open() with O.CLOEXEC returns an error
-
open() with O.CLOEXEC returns an error. http://plash.beasts.org/wiki/ PlashIssues/CloexecOpenFails?highlight=%28PlashIssues/ %29|%28CategoryPostponed%29.
-
-
-
-
47
-
-
80051977949
-
-
PhD thesis, The University of Texas at Austin
-
D. Porter. Operating system transactions. PhD thesis, The University of Texas at Austin, 2010.
-
(2010)
Operating System Transactions
-
-
Porter, D.1
-
48
-
-
72249089012
-
Operating system transactions
-
D. Porter, O. Hofmann, C. Rossbach, A. Benn, and E. Witchel. Operating system transactions. In SOSP, 2009.
-
(2009)
SOSP
-
-
Porter, D.1
Hofmann, O.2
Rossbach, C.3
Benn, A.4
Witchel, E.5
-
49
-
-
84878346861
-
Improving host security with system call policies
-
N. Provos. Improving host security with system call policies. In USENIX Security, 2003.
-
(2003)
USENIX Security
-
-
Provos, N.1
-
50
-
-
85084162270
-
Design and implementation of a TCG-based integrity measurement architecture
-
R. Sailer, X. Zhang, T. Jaeger, and L. van Doorn. Design and implementation of a TCG-based integrity measurement architecture. In USENIX Security, 2004.
-
(2004)
USENIX Security
-
-
Sailer, R.1
Zhang, X.2
Jaeger, T.3
Van Doorn, L.4
-
51
-
-
85177683123
-
-
M. Seaborn. Plash. http://plash.beasts.org/wiki/.
-
-
-
Seaborn, M.1
-
52
-
-
0034829697
-
A fast automaton-based method for detecting anomalous program behaviors
-
R. Sekar, M. Bendre, D. Dhurjati, and P. Bollineni. A fast automaton-based method for detecting anomalous program behaviors. In S&P, 2001.
-
(2001)
S&P
-
-
Sekar, R.1
Bendre, M.2
Dhurjati, D.3
Bollineni, P.4
-
53
-
-
85084100576
-
Dealing with disaster: Surviving misbehaved kernel extensions
-
M. Seltzer, Y. Endo, C. Small, and K. Smith. Dealing with disaster: Surviving misbehaved kernel extensions. In OSDI, 1996.
-
(1996)
OSDI
-
-
Seltzer, M.1
Endo, Y.2
Small, C.3
Smith, K.4
-
54
-
-
33646001408
-
Execution transactions for defending against software failures: Use and evaluation
-
S. Sidiroglou and A. Keromytis. Execution transactions for defending against software failures: use and evaluation. Int. J. Inf. Secur, 5(2), 2006.
-
(2006)
Int. J. Inf. Secur
, vol.5
, Issue.2
-
-
Sidiroglou, S.1
Keromytis, A.2
-
55
-
-
84969564072
-
One-way isolation: An effective approach for realizing safe execution environments
-
W. Sun, Z. Liang, R. Sekar, and V. Venkatakrishnan. One-way isolation: An effective approach for realizing safe execution environments. In NDSS, 2005.
-
(2005)
NDSS
-
-
Sun, W.1
Liang, Z.2
Sekar, R.3
Venkatakrishnan, V.4
-
56
-
-
0034836394
-
Intrusion detection via static analysis
-
D. Wagner and D. Dean. Intrusion detection via static analysis. In S&P, 2001.
-
(2001)
S&P
-
-
Wagner, D.1
Dean, D.2
-
57
-
-
74049120743
-
Countering kernel rootkits with lightweight hook protection
-
Z. Wang, X. Jiang, W Cui, and P. Ning. Countering kernel rootkits with lightweight hook protection. In CCS, 2009.
-
(2009)
CCS
-
-
Wang, Z.1
Jiang, X.2
Cui, W.3
Ning, P.4
-
58
-
-
85084162296
-
Exploiting concurrency vulnerabilities in system call wrappers
-
R. Watson. Exploiting concurrency vulnerabilities in system call wrappers. In WOOT, 2007.
-
(2007)
WOOT
-
-
Watson, R.1
-
60
-
-
0037636215
-
Intrusion detection using variable-length audit trail patterns
-
A. Wespi, M. Dacier, and H. Debar. Intrusion detection using variable-length audit trail patterns. In RAID, 2000.
-
(2000)
RAID
-
-
Wespi, A.1
Dacier, M.2
Debar, H.3
-
62
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
B. Yee, D. Sehr, G. Dardyk, B. Chen, R. Muth, T. Ormandy, S. Okasaka, N. Narula, and N. Fullagar. Native Client: A sandbox for portable, untrusted x86 native code. In S&P, 2009.
-
(2009)
S&P
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
|