메뉴 건너뛰기




Volumn , Issue , 2012, Pages 275-282

Identifying native applications with high assurance

Author keywords

application authentication; cryptography; malware; operating system; process identification

Indexed keywords

CRYPTOGRAPHY; LINUX; MALWARE; MONITORING; NETWORK SECURITY;

EID: 84866626135     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2133601.2133635     Document Type: Conference Paper
Times cited : (5)

References (26)
  • 1
    • 85139866242 scopus 로고    scopus 로고
    • grsecurity. http://www. grsecurity. net/.
  • 7
    • 84858758065 scopus 로고    scopus 로고
    • Vx32: lightweight user-level sandboxing on the x86
    • Berkeley, CA, USA. USENIX Association
    • B. Ford and R. Cox. Vx32: lightweight user-level sandboxing on the x86. In Proceedings of the 2008 USENIX Annual Technical Conference, pages 293-306, Berkeley, CA, USA, 2008. USENIX Association.
    • (2008) Proceedings of the 2008 USENIX Annual Technical Conference , pp. 293-306
    • Ford, B.1    Cox, R.2
  • 14
    • 84889023382 scopus 로고    scopus 로고
    • Making Linux protection mechanisms egalitarian with UserFS
    • Berkeley, CA, USA. USENIX Association
    • T. Kim and N. Zeldovich. Making Linux protection mechanisms egalitarian with UserFS. In Proceedings of the 19th USENIX conference on Security, pages 13-27, Berkeley, CA, USA, 2010. USENIX Association.
    • (2010) Proceedings of the 19th USENIX conference on Security , pp. 13-27
    • Kim, T.1    Zeldovich, N.2
  • 17
    • 2442425355 scopus 로고    scopus 로고
    • Integrating flexible support for security policies into the Linux operating system
    • Berkeley, CA. USENIX Association
    • P. Loscocco and S. Smalley. Integrating flexible support for security policies into the Linux operating system. In Proceedings of the 2001 USENIX Annual Technical Conference, Berkeley, CA, 2001. USENIX Association.
    • (2001) Proceedings of the 2001 USENIX Annual Technical Conference
    • Loscocco, P.1    Smalley, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.