-
1
-
-
33646767376
-
Control-flow integrity
-
ABADI, M., BUDIU, M., ERLINGSSON, U., AND LIGATTI, J. 2005. Control-flow integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05). 340-353.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS'05)
, pp. 340-353
-
-
Abadi, M.1
Budiu, M.2
Erlingsson, U.3
Ligatti, J.4
-
2
-
-
79959891419
-
Language-independent sandboxing of just-in-time compilation and self-modifying code
-
ANSEL, J.,MARCHENKO, P.,ERLINGSSON, U.,TAYLOR, E.,CHEN, B.,SCHUFF, D.,SEHR, D.,BIFFLE, C., AND YEE, B. 2011. Language-independent sandboxing of just-in-time compilation and self-modifying code. In Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI'11). 355-366.
-
(2011)
Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI'11)
, pp. 355-366
-
-
Ansel, J.1
Marchenko, P.2
Erlingsson, U.3
Taylor, E.4
Chen, B.5
Schuff, D.6
Sehr, D.7
Biffle, C.8
Yee, B.9
-
3
-
-
84875859350
-
Dune: Safe user-level access to privileged cpu features
-
BELAY, A., BITTAU, A.,MASHTIZADEH, A., TEREI, D.,MAZIERES, D., AND KOZYRAKIS, C. 2012. Dune: Safe user-level access to privileged cpu features. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI'12). 335-348.
-
(2012)
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI'12)
, pp. 335-348
-
-
Belay, A.1
Bittau, A.2
Mashtizadeh, A.3
Terei, D.4
Mazieres, D.5
Kozyrakis, C.6
-
4
-
-
85091966368
-
Wedge: Splitting applications into reducedprivilege compartments
-
BITTAU, A., MARCHENKO, P., HANDLEY, M., AND KARP, B. 2008. Wedge: Splitting applications into reducedprivilege compartments. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation. 309-322.
-
(2008)
Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
, pp. 309-322
-
-
Bittau, A.1
Marchenko, P.2
Handley, M.3
Karp, B.4
-
5
-
-
34248160938
-
The dacapo benchmarks: Java benchmarking development and analysis
-
BLACKBURN, S. M., GARNER, R., HOFFMANN, C., KHAN, A. M.,MCKINLEY, K. S., BENTZUR, R., DIWAN, A., FEINBERG, D., FRAMPTON, D.,GUYER, S. Z.,HIRZEL, M.,HOSKING, A. L., JUMP, M., LEE, H. B.,MOSS, J. E. B., PHANSALKAR, A., STEFANOVIC, D., VANDRUNEN, T., VON DINCKLAGE, D., ANDWIEDERMANN, B. 2006. The dacapo benchmarks: Java benchmarking development and analysis. In Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA'06). 169-190.
-
(2006)
Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA'06)
, pp. 169-190
-
-
Blackburn, S.M.1
Garner, R.2
Hoffmann, C.3
Khan, M.4
Mckinley, A.K.S.5
Bentzur, R.6
Diwan, A.7
Feinberg, D.8
Frampton, D.9
Guyer, Z.10
Hirzel, S.M.11
Hosking, A.L.12
Jump, M.13
Lee, B.14
Moss, H.J.E.B.15
Phansalkar, A.16
Stefanovic, D.17
Vandrunen, T.18
Von Dincklage, D.19
Andwiedermann, B.20
more..
-
6
-
-
78649981256
-
Retaining sandbox containment despite bugs in privileged memory-safe code
-
CAPPOS, J., DADGAR, A., RASLEY, J., SAMUEL, J., BESCHASTNIKH, I., BARSAN, C., KRISHNAMURTHY, A., AND ANDERSON, T. E. 2010. Retaining sandbox containment despite bugs in privileged memory-safe code. In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10). 212-223.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS'10)
, pp. 212-223
-
-
Cappos, J.1
Dadgar, A.2
Rasley, J.3
Samuel, J.4
Beschastnikh, I.5
Barsan, C.6
Krishnamurthy, A.7
Anderson, T.E.8
-
7
-
-
34547351378
-
Heap protection for Java virtual machines
-
DOI 10.1145/1168054.1168069, ACM International Conference Proceeding Series - Proceedings of the 4th International Symposium on Principles and Practice of Programming in Java, PPPJ 2006
-
CHIBA, Y. 2006. Heap protection for java virtual machines. In Proceedings of the 4th International Symposium on Principles and Practice of Programming in Java. 103-112. (Pubitemid 47142497)
-
(2006)
ACM International Conference Proceeding Series
, vol.178
, pp. 103-112
-
-
Chiba, Y.1
-
8
-
-
33751067472
-
A safety-oriented platform for Web applications
-
DOI 10.1109/SP.2006.4, 1624025, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006
-
COX, R. S.,GRIBBLE, S. D.,LEVY, H. M., AND HANSEN, J. G. 2006. A safety-oriented platform for web applications. In Proceedings of the IEEE Symposium on Security and Privacy (S&P'06). 350-364. (Pubitemid 44753736)
-
(2006)
Proceedings - IEEE Symposium on Security and Privacy
, vol.2006
, pp. 350-364
-
-
Cox, R.S.1
Hansen, J.G.2
Gribble, S.D.3
Levy, H.M.4
-
9
-
-
85076904874
-
Leveraging legacy code to deploy desktop applications on the web
-
DOUCEUR, J. R., ELSON, J., HOWELL, J., AND LORCH, J. R. 2008. Leveraging legacy code to deploy desktop applications on the web. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI'08). 339-354.
-
(2008)
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI'08)
, pp. 339-354
-
-
Douceur, J.R.1
Elson, J.2
Howell, J.3
Lorch, J.R.4
-
11
-
-
84885664275
-
Labels and event processes in the asbestos operating system
-
DOI 10.1145/1095809.1095813
-
EFSTATHOPOULOS, P.,KROHN, M., VANDEBOGART, S., FREY, C., ZIEGLER, D.,KOHLER, E.,MAZIERES, D., KAASHOEK, M. F., AND MORRIS, R. 2005. Labels and event processes in the asbestos operating system. In Proceedings of the ACM SIGOPS Symposium on Operating Systems Principles (SOSP'05). 17-30. (Pubitemid 44892202)
-
(2005)
Operating Systems Review (ACM)
, vol.39
, Issue.5
, pp. 17-30
-
-
Efstathopoulos, P.1
Krohn, M.2
VanDeBogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazieres, D.7
Kaashoek, F.8
Morris, R.9
-
14
-
-
33745782092
-
Polymorphic type inference for the JNI
-
DOI 10.1007/11693024-21, Programming Languages and Systems - 15th European Symposium on Programming, ESOP 2006, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2006, Proceedings LNCS
-
FURR, M. AND FOSTER, J. 2006. Polymorphic type inference for the jni. In Proceedings of the 15th European Symposium on Programming (ESOP'06). 309-324. (Pubitemid 44019567)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3924
, pp. 309-324
-
-
Furr, M.1
Foster, J.S.2
-
16
-
-
85084162735
-
A secure environment for untrusted helper applications: Confining the wily hacker
-
GOLDBERG, I., WAGNER, D., THOMAS, R., AND BREWER, E. A. 1996. A secure environment for untrusted helper applications: Confining the wily hacker. In Proceedings of the 6th Conference on USENIX Security Symposium.
-
(1996)
Proceedings of the 6th Conference on USENIX Security Symposium
-
-
Goldberg, I.1
Wagner, D.2
Thomas, R.3
Brewer, E.A.4
-
18
-
-
42149088252
-
Jeannie: Granting java native interface developers their wishes
-
HIRZEL, M. AND GRIMM, R. 2007. Jeannie: Granting java native interface developers their wishes. In Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA'07). 19-38.
-
(2007)
Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA'07)
, pp. 19-38
-
-
Hirzel, M.1
Grimm, R.2
-
20
-
-
85084164164
-
Cyclone: A safe dialect of C
-
JIM, T., MORRISETT, G., GROSSMAN, D., HICKS, M. W., CHENEY, J., AND WANG, Y. 2002. Cyclone: A safe dialect of C. In Proceedings of the General Track USENIX Annual Technical Conference. USENIX Association, 275-288.
-
(2002)
Proceedings of the General Track USENIX Annual Technical Conference. USENIX Association
, pp. 275-288
-
-
Jim, T.1
Morrisett, G.2
Grossman, D.3
Hicks, M.W.4
Cheney, J.5
Wang, Y.6
-
21
-
-
35348813102
-
Extending .NET security to unmanaged code
-
DOI 10.1007/s10207-007-0031-0
-
KLINKOFF, P., KIRDA, E., KRUEGEL, C., AND VIGNA, G. 2007. Extending .net security to unmanaged code. Int. J. Inf. Secur. 6, 6, 417-428. (Pubitemid 47570524)
-
(2007)
International Journal of Information Security
, vol.6
, Issue.6
, pp. 417-428
-
-
Klinkoff, P.1
Kirda, E.2
Kruegel, C.3
Vigna, G.4
-
24
-
-
57749192483
-
Information flow control for standard os abstractions
-
KROHN, M., YIP, A., BRODSKY, M., CLIFFER, N., KAASHOEK, M. F., KOHLER, E., AND MORRIS, R. 2007. Information flow control for standard os abstractions. In Proceedings of the ACM SIGOPS Symposium on Operating Systems Principles (SOSP'07). 321-334.
-
(2007)
Proceedings of the ACM SIGOPS Symposium on Operating Systems Principles (SOSP'07)
, pp. 321-334
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
25
-
-
77954751054
-
Jinn: Synthesizing a dynamic bug detector for foreign language interfaces
-
LEE, B., HIRZEL, M., GRIMM, R., WIEDERMANN, B., AND MCKINLEY, K. S. 2010. Jinn: Synthesizing a dynamic bug detector for foreign language interfaces. In Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI'10). 36-49.
-
(2010)
Proceedings of the ACM Conference on Programming Language Design and Implementation (PLDI'10)
, pp. 36-49
-
-
Lee, B.1
Hirzel, M.2
Grimm, R.3
Wiedermann, B.4
McKinley, K.S.5
-
32
-
-
84890400270
-
-
MITRE CVE-2012-4681
-
MITRE. 2012. CVE-2012-4681. http://web.nvd.nist.gov/view/vuln/detail? vulnId=CVE-2012-4681.
-
(2012)
-
-
-
33
-
-
84890401109
-
-
CVE-2013-0422
-
MITRE. 2013. CVE-2013-0422. http://web.nvd.nist.gov/view/vuln/detail? vulnId=CVE-2013-0422.
-
(2013)
MITRE
-
-
-
34
-
-
0031679751
-
From System F to typed assembly language
-
ACM Press, New York
-
MORRISETT, G., WALKER, D., CRARY, K., AND GLEW, N. 1998. From System F to typed assembly language. In Proceedings of the 25th ACM Symposium on Principles of Programming Languages (POPL'98). ACM Press, New York, 85-97.
-
(1998)
Proceedings of the 25th ACM Symposium on Principles of Programming Languages (POPL'98)
, pp. 85-97
-
-
Morrisett, G.1
Walker, D.2
Crary, K.3
Glew, N.4
-
35
-
-
0041525084
-
From system f to typed assembly language
-
MORRISETT, G., WALKER, D., CRARY, K., AND GLEW, N. 1999. From system f to typed assembly language. ACM Trans. Program. Lang. Syst. 21, 3, 527-568.
-
(1999)
ACM Trans. Program. Lang. Syst.
, vol.21
, Issue.3
, pp. 527-568
-
-
Morrisett, G.1
Walker, D.2
Crary, K.3
Glew, N.4
-
38
-
-
84856438444
-
Capabilities revisited: A holistic approach to bottom-to-top assurance of trustworthy systems
-
NEUMANN, P. AND WATSON, R. 2010. Capabilities revisited: A holistic approach to bottom-to-top assurance of trustworthy systems. In Proceedings of the 4th Layered Assurance Workshop.
-
(2010)
Proceedings of the 4th Layered Assurance Workshop
-
-
Neumann, P.1
Watson, R.2
-
39
-
-
35248884899
-
-
ORACLE
-
ORACLE. 1999. JAR file specification. http://docs.oracle.com/javase/1.4. 2/docs/guide/jar/jar.html.
-
(1999)
JAR File Specification
-
-
-
40
-
-
84890370128
-
-
ORACLE
-
ORACLE. 2010. JVM tool interface, version 1.0. http://docs.oracle.com/ javase/1.5.0/docs/guide/jvmti/jvmti.html.
-
(2010)
JVM Tool Interface, Version 1.0
-
-
-
41
-
-
84878346861
-
Improving host security with system call policies
-
PROVOS, N
-
PROVOS, N. 2003. Improving host security with system call policies. In Proceedings of the 12th Usenix Security Symposium. 257-272.
-
(2003)
Proceedings of the 12th Usenix Security Symposium
, pp. 257-272
-
-
-
42
-
-
81455129267
-
-
PYTHON/C FFI
-
PYTHON/C FFI, 2009, Python/C api reference manual, http://docs.python. org/c-api/index.html
-
(2009)
Python/C Api Reference Manual
-
-
-
43
-
-
85072933898
-
Adapting software fault isolation to contemporary cpu architectures
-
SEHR, D., MUTH, R., BIFFLE, C., KHIMENKO, V., PASKO, E., SCHIMPF, K., YEE, B., AND CHEN, B. 2010. Adapting software fault isolation to contemporary cpu architectures. In Proceedings of the 19th Usenix Security Symposium. 1-12.
-
(2010)
Proceedings of the 19th Usenix Security Symposium
, pp. 1-12
-
-
Sehr, D.1
Muth, R.2
Biffle, C.3
Khimenko, V.4
Pasko, E.5
Schimpf, K.6
Yee, B.7
Chen, B.8
-
48
-
-
85077022007
-
Recovering device drivers
-
SWIFT, M. M., ANNAMALAI, M., BERSHAD, B. N., AND LEVY, H. M. 2004. Recovering device drivers. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI'04). 1-16.
-
(2004)
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI'04)
, pp. 1-16
-
-
Swift, M.M.1
Annamalai, M.2
Bershad, B.N.3
Levy, H.M.4
-
49
-
-
42149145087
-
Safe java native interface
-
TAN, G.,APPEL, A.,CHAKRADHAR, S.,RAGHUNATHAN, A.,RAVI, S., ANDWANG, D. 2006. Safe java native interface. In Proceedings of the IEEE International Symposium on Secure Software Engineering (ISSSE'06). 97-106.
-
(2006)
Proceedings of the IEEE International Symposium on Secure Software Engineering (ISSSE'06)
, pp. 97-106
-
-
Tan, G.1
Aappel, A.2
Chakradhar, S.3
Raghunathan, A.4
Ravi, S.5
Andwang, D.6
-
51
-
-
67650077422
-
ILEA: Inter-language analysis across java and C
-
TAN, G. AND MORRISETT, G. 2007. ILEA: Inter-language analysis across java and C. In Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA'07). 39-56.
-
(2007)
Proceedings of the ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA'07)
, pp. 39-56
-
-
Tan, G.1
Morrisett, G.2
-
52
-
-
0027836576
-
Efficient software-based fault isolation
-
ACM Press, New York
-
WAHBE, R., LUCCO, S., ANDERSON, T., AND GRAHAM, S. 1993. Efficient software-based fault isolation. In Proceedings of the ACM SIGOPS Symposium on Operating Systems Principles (SOSP'93). ACM Press, New York, 203-216.
-
(1993)
Proceedings of the ACM SIGOPS Symposium on Operating Systems Principles (SOSP'93)
, pp. 203-216
-
-
Wahbe, R.1
Lucco, S.2
Anderson, T.3
Graham, S.4
-
54
-
-
84872114405
-
Securing untrusted code via compileragnostic binary rewriting
-
WARTELL, R.,MOHAN, V.,HAMLEN, K. W., AND LIN, Z. 2012. Securing untrusted code via compileragnostic binary rewriting. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC'12). 299-308.
-
(2012)
Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC'12)
, pp. 299-308
-
-
Wartell, R.1
Mohan, V.2
Hamlen, K.W.3
Lin, Z.4
-
55
-
-
85067179564
-
Capsicum: Practical capabilities for unix
-
WATSON, R., ANDERSON, J., LAURIE, B., AND KENNAWAY, K. 2010. Capsicum: Practical capabilities for unix. In Proceedings of the 19th Usenix Security Symposium. 29-46.
-
(2010)
Proceedings of the 19th Usenix Security Symposium
, pp. 29-46
-
-
Watson, R.1
Anderson, J.2
Laurie, B.3
Kennaway, K.4
-
56
-
-
33845435188
-
Mondrix: Memory isolation for linux using mondriaan memory protection
-
DOI 10.1145/1095809.1095814
-
WITCHEL, E., RHEE, J., AND ASANOVIC, K. 2005. Mondrix: Memory isolation for linux using mondriaan memory protection. In Proceedings of the ACM SIGOPS Symposium on Operating Systems Principles (SOSP'05). 31-44. (Pubitemid 44892203)
-
(2005)
Operating Systems Review (ACM)
, vol.39
, Issue.5
, pp. 31-44
-
-
Witchel, E.1
Rhee, J.2
Asanovic, K.3
-
57
-
-
69149106605
-
Native client: A sandbox for portable, untrusted x86 native code
-
YEE, B., SEHR, D., DARDYK, G., CHEN, B., MUTH, R., ORMANDY, T., OKASAKA, S., NARULA, N., AND FULLAGAR, N.2009. Native client: A sandbox for portable, untrusted x86 native code. In Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P'09). 79-93
-
(2009)
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P'09)
, pp. 79-93
-
-
Yee, B.1
Sehr, D.2
Dardyk, G.3
Chen, B.4
Muth, R.5
Ormandy, T.6
Okasaka, S.7
Narula, N.8
Fullagar, N.9
-
58
-
-
84888352157
-
Making information flow explicit in histar
-
ZELDOVICH, N., BOYD-WICKIZER, S., KOHLER, E., AND MAZIERES, D. 2006. Making information flow explicit in histar. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI'06). 263-278.
-
(2006)
Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI'06)
, pp. 263-278
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazieres, D.4
|