메뉴 건너뛰기




Volumn , Issue , 2014, Pages 973-988

JIGSAW: Protecting resource access by inferring programmer expectations

Author keywords

[No Author keywords available]

Indexed keywords

DATA FLOW ANALYSIS; FLOW GRAPHS;

EID: 84937690805     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (29)

References (45)
  • 1
    • 0004200684 scopus 로고
    • Technical Report ESD-TR-73-51, Deputy for Command and Management Systems, HQ Electronics Systems Division (AFSC), L. G. Hanscom Field, Bedford, MA, October
    • J. P. Anderson. Computer Security Technology Planning Study, Volume II. Technical Report ESD-TR-73-51, Deputy for Command and Management Systems, HQ Electronics Systems Division (AFSC), L. G. Hanscom Field, Bedford, MA, October 1972.
    • (1972) Computer Security Technology Planning Study , vol.2
    • Anderson, J.P.1
  • 2
    • 85076291316 scopus 로고    scopus 로고
    • Apache Performance Tuning. http://httpd.apache.org/docs/2.2/misc/perf-tuning.html#symlinks, 2012.
    • (2012)
  • 3
    • 60649106745 scopus 로고    scopus 로고
    • Automatic inference and enforcement of kernel data structure invariants
    • Anaheim, California, USA, December IEEE Computer Society Press, Los Alamitos, California, USA
    • A. Baliga, V. Ganapathy, and L. Iftode. Automatic inference and enforcement of kernel data structure invariants. In ACSAC'08: Proceedings of the 24th Annual Computer Security Applications Conference, pages 77-86, Anaheim, California, USA, December 2008. IEEE Computer Society Press, Los Alamitos, California, USA.
    • (2008) ACSAC'08: Proceedings of the 24th Annual Computer Security Applications Conference , pp. 77-86
    • Baliga, A.1    Ganapathy, V.2    Iftode, L.3
  • 4
    • 50249115131 scopus 로고    scopus 로고
    • Saner: Composing static and dynamic analysis to validate sanitization in web applications
    • D. Balzarotti et al. Saner: Composing static and dynamic analysis to validate sanitization in web applications. In Proceedings of the IEEE Symposium on Security and Privacy, 2008.
    • (2008) Proceedings of the IEEE Symposium on Security and Privacy
    • Balzarotti, D.1
  • 5
    • 84893074859 scopus 로고    scopus 로고
    • A system to specify and manage multipolicy access control models
    • IEEE Computer Society
    • E. Bertino, B. Catania, E. Ferrari, and P. Perlasca. A system to specify and manage multipolicy access control models. In Proceedings of POLICY'02. IEEE Computer Society, 2002.
    • (2002) Proceedings of POLICY'02
    • Bertino, E.1    Catania, B.2    Ferrari, E.3    Perlasca, P.4
  • 6
    • 85076234531 scopus 로고    scopus 로고
    • Checking for race conditions in file accesses
    • Spring
    • M. Bishop and M. Digler. Checking for race conditions in file accesses. Computer Systems, 9(2), Spring 1996.
    • (1996) Computer Systems , vol.9 , Issue.2
    • Bishop, M.1    Digler, M.2
  • 8
    • 84877714434 scopus 로고    scopus 로고
    • Exploiting unix file-system races via algorithmic complexity attacks
    • X. Cai et al. Exploiting Unix File-System Races via Algorithmic Complexity Attacks. In IEEE SSP '09, 2009.
    • (2009) IEEE SSP '09
    • Cai, X.1
  • 10
    • 84858757104 scopus 로고    scopus 로고
    • Where do you want to go today? Escalating privileges by pathname manipulation
    • S. Chari et al. Where do you want to go today? escalating privileges by pathname manipulation. In NDSS '10, 2010.
    • (2010) NDSS '10
    • Chari, S.1
  • 16
    • 0024089972 scopus 로고
    • The confused deputy
    • Oct.
    • N. Hardy. The confused deputy. Operating Systems Review, 22(4):36-38, Oct. 1988.
    • (1988) Operating Systems Review , vol.22 , Issue.4 , pp. 36-38
    • Hardy, N.1
  • 18
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • July
    • J. C. King. Symbolic execution and program testing. Communications of the ACM, 19(7):385-394, July 1976.
    • (1976) Communications of the ACM , vol.19 , Issue.7 , pp. 385-394
    • King, J.C.1
  • 19
    • 57749192483 scopus 로고    scopus 로고
    • Information flow control for standard OS abstractions
    • M. N. Krohn et al. Information flow control for standard OS abstractions. In SOSP '07, 2007.
    • (2007) SOSP '07
    • Krohn, M.N.1
  • 20
    • 39049160206 scopus 로고    scopus 로고
    • A general dynamic information flow tracking framework for security applications
    • IEEE Computer Society
    • L. C. Lam and T.-C. Chiueh. A general dynamic information flow tracking framework for security applications. In Proceedings of ACSAC '06, pages 463-472. IEEE Computer Society, 2006.
    • (2006) Proceedings of ACSAC '06 , pp. 463-472
    • Lam, L.C.1    Chiueh, T.-C.2
  • 22
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software
    • J. Newsome et al. Dynamic taint analysis for automatic detection, analysis, and signaturegeneration of exploits on commodity software. In NDSS, 2005.
    • (2005) NDSS
    • Newsome, J.1
  • 24
    • 85076287019 scopus 로고    scopus 로고
    • Selinux. http://www.nsa.gov/selinux.
    • Selinux
  • 26
    • 84904495050 scopus 로고    scopus 로고
    • Rps: An extension of reference monitor to prevent race-attacks
    • J. Park, G. Lee, S. Lee, and D.-K. Kim. Rps: An extension of reference monitor to prevent race-attacks. In PCM (1) 04, 2004.
    • (2004) PCM (1) 04
    • Park, J.1    Lee, G.2    Lee, S.3    Kim, D.-K.4
  • 29
    • 85076293544 scopus 로고    scopus 로고
    • Operating system transactions
    • D. E. Porter et al. Operating system transactions. In SOSP '09, 2009.
    • (2009) SOSP '09
    • Porter, D.E.1
  • 30
    • 85048404745 scopus 로고    scopus 로고
    • Preventing privilege escalation
    • N. Provos et al. Preventing privilege escalation. In USENIX Security '03, 2003.
    • (2003) USENIX Security '03
    • Provos, N.1
  • 31
    • 40349087553 scopus 로고    scopus 로고
    • LIFT: A low-overhead practical information flow tracking system for detecting security attacks
    • F. Qin et al. LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. In MICRO 39, 2006.
    • (2006) MICRO 39
    • Qin, F.1
  • 33
    • 80053015448 scopus 로고    scopus 로고
    • An efficient black-box technique for defeating web application attacks
    • R. Sekar. An efficient black-box technique for defeating web application attacks. In NDSS, 2009.
    • (2009) NDSS
    • Sekar, R.1
  • 36
    • 78449299493 scopus 로고    scopus 로고
    • Portably solving file tocttou races with hardness amplification
    • D. Tsafrir et al. Portably solving file tocttou races with hardness amplification. In USENIX FAST, 2008.
    • (2008) USENIX FAST
    • Tsafrir, D.1
  • 38
    • 33644499445 scopus 로고    scopus 로고
    • Preventing race condition attacks on file-systems
    • P. Uppuluri, U. Joshi, and A. Ray. Preventing race condition attacks on file-systems. In SAC-05, 2005.
    • (2005) SAC-05
    • Uppuluri, P.1    Joshi, U.2    Ray, A.3
  • 41
    • 84871971635 scopus 로고    scopus 로고
    • Integrity walls: Finding attack surfaces from mandatory access control policies
    • H. Vijayakumar et al. Integrity walls: Finding attack surfaces from mandatory access control policies. In ASIACCS, 2012.
    • (2012) ASIACCS
    • Vijayakumar, H.1
  • 42
    • 85067179564 scopus 로고    scopus 로고
    • Capsicum: Practical capabilities for UNIX
    • R. Watson et al. Capsicum: practical capabilities for UNIX. In USENIX Security, 2010.
    • (2010) USENIX Security
    • Watson, R.1
  • 43
    • 36049014300 scopus 로고    scopus 로고
    • Tocttou vulnerabilities in unix-style file systems: An anatomical study
    • J. Wei et al. Tocttou vulnerabilities in unix-style file systems: an anatomical study. In USENIX FAST '05, 2005.
    • (2005) USENIX FAST '05
    • Wei, J.1
  • 45
    • 84888352157 scopus 로고    scopus 로고
    • Making information flow explicit in HiStar
    • N. Zeldovich et al. Making information flow explicit in HiStar. In OSDI '06, 2006.
    • (2006) OSDI '06
    • Zeldovich, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.