-
1
-
-
84877963797
-
-
Online; accessed on 21-October-2012
-
http://web.nvd.nist.gov/view/vuln/search. [Online; accessed on 21-October-2012].
-
-
-
-
2
-
-
84877974307
-
-
Online; accessed on 22-October-2012
-
http://httpd.apache.org/security/vulnerabilities-22.html. [Online; accessed on 22-October-2012].
-
-
-
-
3
-
-
84877982551
-
-
AppArmor. http://wiki.apparmor.net.
-
AppArmor
-
-
-
4
-
-
84877965665
-
-
SELinux. http://selinuxproject.org.
-
-
-
-
5
-
-
33646767376
-
Control-flow integrity
-
ABADI, M., BUDIU, M., ERLINGSSON, Ú., AND LIGATTI, J. Control-flow integrity. In 12th ACM Conference on Computer and Communications Security (CCS) (2005), pp. 340-353.
-
12th ACM Conference on Computer and Communications Security (CCS) (2005)
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, Ú.3
Ligatti, J.4
-
6
-
-
50249149602
-
Preventing memory error exploits with wit
-
AKRITIDIS, P., CADAR, C., RAICIU, C., COSTA, M., AND CASTRO, M. Preventing memory error exploits with wit. In IEEE Symposium on Security and Privacy (S&P) (2008), pp. 263-277.
-
IEEE Symposium on Security and Privacy (S&P) (2008)
, pp. 263-277
-
-
Akritidis, P.1
Cadar, C.2
Raiciu, C.3
Costa, M.4
Castro, M.5
-
8
-
-
72249091267
-
Fast byte-granularity software fault isolation
-
CASTRO, M., COSTA, M., MARTIN, J.-P., PEINADO, M., AKRITIDIS, P., DONNELLY, A., BARHAM, P., AND BLACK, R. Fast byte-granularity software fault isolation. In ACM SIGOPS Symposium on Operating Systems Principles (SOSP) (2009), pp. 45-58.
-
ACM SIGOPS Symposium on Operating Systems Principles (SOSP) (2009)
, pp. 45-58
-
-
Castro, M.1
Costa, M.2
Martin, J.-P.3
Peinado, M.4
Akritidis, P.5
Donnelly, A.6
Barham, P.7
Black, R.8
-
9
-
-
0016949746
-
A lattice model of secure information flow
-
DENNING, D. E. A lattice model of secure information flow. Communications of The ACM 19 (1976), 236-243.
-
(1976)
Communications of the ACM
, vol.19
, pp. 236-243
-
-
Denning, D.E.1
-
10
-
-
84885664275
-
Labels and event processes in the Asbestos operating system
-
EFSTATHOPOULOS, P., KROHN, M., VANDEBOGART, S., FREY, C., ZIEGLER, D., KOHLER, E., M AZIÈRES, D., KAASHOEK, M. F., AND MORRIS, R. Labels and event processes in the Asbestos operating system. In ACM SIGOPS Symposium on Operating Systems Principles (SOSP) (2005), pp. 17-30.
-
ACM SIGOPS Symposium on Operating Systems Principles (SOSP) (2005)
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
Vandebogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, M.F.8
Morris, R.9
-
11
-
-
78651539599
-
XFI: Software guards for system address spaces
-
ERLINGSSON, Ú., ABADI, M., VRABLE, M., BUDIU, M., AND NECULA, G. XFI: Software guards for system address spaces. In USENIX Symposium on Operating Systems Design and Implementation (OSDI) (2006), pp. 75-88.
-
USENIX Symposium on Operating Systems Design and Implementation (OSDI) (2006)
, pp. 75-88
-
-
Erlingsson, Ú.1
Abadi, M.2
Vrable, M.3
Budiu, M.4
Necula, G.5
-
14
-
-
47149101814
-
Information flow control for standard OS abstractions
-
KROHN, M., YIP, A., BRODSKY, M., CLIFFER, N., KAASHOEK, M. F., KOHLER, E., AND MORRIS, R. Information flow control for standard OS abstractions. In ACM SIGOPS Symposium on Operating Systems Principles (SOSP) (2007), pp. 321-334.
-
ACM SIGOPS Symposium on Operating Systems Principles (SOSP) (2007)
, pp. 321-334
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
18
-
-
84869485006
-
Enforcing user-space privilege separation with declarative architectures
-
ACM
-
NIU, B., AND TAN, G. Enforcing user-space privilege separation with declarative architectures. In Proceedings of the seventh ACM workshop on Scalable trusted computing (New York, NY, USA, 2012), STC '12, ACM, pp. 9-20.
-
Proceedings of the Seventh ACM Workshop on Scalable Trusted Computing (New York, NY, USA, 2012), STC '12
, pp. 9-20
-
-
Niu, B.1
Tan, G.2
-
19
-
-
84878346861
-
Improving host security with system call policies
-
PROVOS, N. Improving host security with system call policies. In 12th Usenix Security Symposium (2003), pp. 257-272.
-
12th Usenix Security Symposium (2003)
, pp. 257-272
-
-
Provos, N.1
-
20
-
-
0016555241
-
The protection of information in computer systems
-
Sept.
-
SALTZER, J., AND SCHROEDER, M. The protection of information in computer systems. Proceedings of The IEEE 63, 9 (Sept. 1975), 1278-1308.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
22
-
-
0027836576
-
Efficient software-based fault isolation
-
ACM Press
-
WAHBE, R., LUCCO, S., ANDERSON, T., AND GRAHAM, S. Efficient software-based fault isolation. In ACM SIGOPS Symposium on Operating Systems Principles (SOSP) (New York, 1993), ACM Press, pp. 203-216.
-
ACM SIGOPS Symposium on Operating Systems Principles (SOSP) (New York, 1993)
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.3
Graham, S.4
-
23
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
YEE, B., SEHR, D., DARDYK, G., CHEN, B., MUTH, R., ORMANDY, T., OKASAKA, S., NARULA, N., AND FULLAGAR, N. Native client: A sandbox for portable, untrusted x86 native code. In IEEE Symposium on Security and Privacy (S&P) (May 2009).
-
IEEE Symposium on Security and Privacy (S&P) (May 2009)
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
24
-
-
36448939517
-
Tightlip: keeping applications from spilling the beans
-
USENIX Association
-
YUMEREFENDI, A. R., MICKLE, B., AND COX, L. P. Tightlip: keeping applications from spilling the beans. In Proceedings of the 4th USENIX conference on Networked systems design & implementation (Berkeley, CA, USA, 2007), NSDI'07, USENIX Association, pp. 12-12.
-
Proceedings of the 4th USENIX Conference on Networked Systems Design & Implementation (Berkeley, CA, USA, 2007), NSDI'07
, pp. 12-12
-
-
Yumerefendi, A.R.1
Mickle, B.2
Cox, L.P.3
-
25
-
-
0037974191
-
Secure program partitioning
-
ZDANCEWIC, S., ZHENG, L., NYSTROM, N., AND MYERS, A. Secure program partitioning. ACM Transactions on Compututer Systems (TOCS) 20, 3 (2002), 283-328.
-
(2002)
ACM Transactions on Compututer Systems (TOCS)
, vol.20
, Issue.3
, pp. 283-328
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.4
-
26
-
-
84888352157
-
Making information flow explicit in HiStar
-
ZELDOVICH, N., BOYD-WICKIZER, S., KOHLER, E., AND M AZIÈRES, D. Making information flow explicit in HiStar. In USENIX Symposium on Operating Systems Design and Implementation (OSDI) (2006), pp. 263-278.
-
USENIX Symposium on Operating Systems Design and Implementation (OSDI) (2006)
, pp. 263-278
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
-
27
-
-
0038825029
-
Using replication and partitioning to build secure distributed systems
-
ZHENG, L., CHONG, S., MYERS, A., AND ZDANCEWIC, S. Using replication and partitioning to build secure distributed systems. In IEEE Symposium on Security and Privacy (S&P) (2003), pp. 236-250.
-
IEEE Symposium on Security and Privacy (S&P) (2003)
, pp. 236-250
-
-
Zheng, L.1
Chong, S.2
Myers, A.3
Zdancewic, S.4
|