-
2
-
-
84893073907
-
-
NRL
-
Archer, M., E. Leonard, and M. Pradella, "Towards a Methodology and Tool for the Analysis of Security-Enhanced Linux," Technical Report NRL/MR/5540-02-8629, NRL, 2002
-
(2002)
Towards a Methodology and Tool for the Analysis of Security-Enhanced Linux," Technical Report NRL/MR/5540-02-8629
-
-
Archer, M.1
Leonard, E.2
Pradella, M.3
-
4
-
-
21644433634
-
Xen and the Art of Virtualization
-
Bolton Landing, NY, Oct
-
Barham, P., B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauery, I. Pratt, and A. Warfield, "Xen and the Art of Virtualization," Proceedings of the 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY, Oct., 2003
-
(2003)
Proceedings of the 19th ACM Symposium on Operating Systems Principles
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauery, R.7
Pratt, I.8
Warfield, A.9
-
5
-
-
85084161168
-
TRON: Process-specific File Protection for the UNIX Operating System
-
Jan
-
Berman, A., V. Bourassa, and E. Selberg, "TRON: Process-specific File Protection for the UNIX Operating System," Proceedings of the 1995 USENIX Winter Technical Conference, Jan., 1995
-
(1995)
Proceedings of the 1995 USENIX Winter Technical Conference
-
-
Berman, A.1
Bourassa, V.2
Selberg, E.3
-
7
-
-
10044275460
-
SubDomain: Parsimonious Server Security
-
New Orleans, LA, Dec
-
Cowan, C., S. Beattie, G. Kroah-Hartman, C. Pu, P. Wagle, and V. Gligor, "SubDomain: Parsimonious Server Security," Proceedings of the 14th USENIX Systems Administration Conference, New Orleans, LA, Dec., 2000
-
(2000)
Proceedings of the 14th USENIX Systems Administration Conference
-
-
Cowan, C.1
Beattie, S.2
Kroah-Hartman, G.3
Pu, C.4
Wagle, P.5
Gligor, V.6
-
8
-
-
85084160243
-
StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks
-
San Antonio, Texas, Jan
-
Cowan, C., C. Pu, D. Maier, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton, "StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," Proceedings of the 7th USENIX Security Conference, San Antonio, Texas, Jan., 1998
-
(1998)
Proceedings of the 7th USENIX Security Conference
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
9
-
-
85094319777
-
-
FreeBSD Project
-
FreeBSD Project, Developer ?s Handbook, http:// www.freebsd.org/doc/en-US.ISO8859-1/books/ developers-handbook/secure-chroot.html
-
Developer ?s Handbook
-
-
-
11
-
-
85180406262
-
Ostia: A Delegating architecture for Secure System Call Interposition
-
Feb
-
Garfinkel, T., B. Pfaff, and M. Rosenblum, "Ostia: A Delegating architecture for Secure System Call Interposition," Proceedings of the 2004 Network and Distributed Systems Security Symposium, Feb., 2004
-
(2004)
Proceedings of the 2004 Network and Distributed Systems Security Symposium
-
-
Garfinkel, T.1
Pfaff, B.2
Rosenblum, M.3
-
12
-
-
85094322324
-
-
GOBBLES Security
-
GOBBLES Security, Local/Remote mpg123 Exploit, http://www.opennet.ru/base/exploits/10425 65884-668.txt.html
-
Local/Remote mpg123 Exploit
-
-
-
14
-
-
12344333072
-
Jails: Confining the Omnipotent Root
-
MECC, Maastricht, The Netherlands, May
-
Kamp P.-H., and R. N. M. Watson, "Jails: Confining the Omnipotent Root," Proceedings of the 2nd International SANE Conference, MECC, Maastricht, The Netherlands, May, 2000
-
(2000)
Proceedings of the 2nd International SANE Conference
-
-
Kamp, P.-H.1
Watson, R. N. M.2
-
15
-
-
85084160041
-
D e t e c t i n g and Countering System Intrusions Using Software Wrappers
-
Aug
-
Ko, C., T. Fraser, L. Badger, and D. Kilpatrick, " D e t e c t i n g and Countering System Intrusions Using Software Wrappers," Proceedings of the 9th Usenix Security Symposium, Aug., 2000
-
(2000)
Proceedings of the 9th Usenix Security Symposium
-
-
Ko, C.1
Fraser, T.2
Badger, L.3
Kilpatrick, D.4
-
17
-
-
84944734361
-
I s o l a t e d Program Execution: An Application Transparent Approach for Executing Untrusted Programs
-
Dec
-
Liang, Z., V. Venkatakrishnan, and R. Sekar, " I s o l a t e d Program Execution: An Application Transparent Approach for Executing Untrusted Programs," Procedings of the 19th Annual Computer Security Applications Conference, Dec., 2003
-
(2003)
Procedings of the 19th Annual Computer Security Applications Conference
-
-
Liang, Z.1
Venkatakrishnan, V.2
Sekar, R.3
-
18
-
-
85094320464
-
-
Linux VServer Project
-
Linux VServer Project, http://www.linux-vserver. org/
-
-
-
-
20
-
-
84978437417
-
The Design and Implementation of Zap: A System for Migrating Computing Environments
-
Boston, MA, Dec
-
Osman, S., D. Subhraveti, G. Su, and J. Nieh, "The Design and Implementation of Zap: A System for Migrating Computing Environments," Proceedings of the 5th Symposium on Operating Systems Design and Implementation, Boston, MA, Dec., 2002
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation
-
-
Osman, S.1
Subhraveti, D.2
Su, G.3
Nieh, J.4
-
21
-
-
85094323343
-
-
Poskanzer, J., http://www.acme.com/software/ http-load/
-
-
-
Poskanzer, J.1
-
22
-
-
44949226701
-
Reducing Downtime Due to System Maintenance and Upgrades
-
San Diego, CA, Dec
-
Potter, S. and J. Nieh, "Reducing Downtime Due to System Maintenance and Upgrades," Proceedings of the 19th Large Installation System Administration Conference, San Diego, CA, Dec., 2005
-
(2005)
Proceedings of the 19th Large Installation System Administration Conference
-
-
Potter, S.1
Nieh, J.2
-
24
-
-
84878346861
-
Improving Host Security with System Call Policies
-
Washington, DC, Aug
-
Provos, N., "Improving Host Security with System Call Policies," Proceedings of the 12th USENIX Security Symposium, Washington, DC, Aug., 2003
-
(2003)
Proceedings of the 12th USENIX Security Symposium
-
-
Provos, N.1
-
28
-
-
85084160641
-
The Flask Security Architecture: System Support for Diverse Security Policies
-
Aug
-
Spencer, R., S. Smalley, P. Loscocco, M. Hibler, D. Andersen, and J. Lepreau, "The Flask Security Architecture: System Support for Diverse Security Policies," Proceedings of the 8th USENIX Security Symposium, Aug., 1999
-
(1999)
Proceedings of the 8th USENIX Security Symposium
-
-
Spencer, R.1
Smalley, S.2
Loscocco, P.3
Hibler, M.4
Andersen, D.5
Lepreau, J.6
-
29
-
-
85094322659
-
-
VMware, Inc
-
VMware, Inc., http://www.vmware.com
-
-
-
-
31
-
-
85084162296
-
Exploiting Concurrency Vulnerabilities in System Call Wrappers
-
Boston, MA, Aug
-
Watson, R. N. M., "Exploiting Concurrency Vulnerabilities in System Call Wrappers," Proceedings of the First USENIX Workshop on Offensive Technologies, Boston, MA, Aug., 2007
-
(2007)
Proceedings of the First USENIX Workshop on Offensive Technologies
-
-
Watson, R. N. M.1
-
32
-
-
1642406477
-
Scale and Performance in the Denali Isolation Kernel
-
Boston, MA, Dec
-
Whitaker, A., M. Shaw, and S. D. Gribble, "Scale and Performance in the Denali Isolation Kernel," Proceedings of the 5th Symposium on Operating Systems Design and Implementation, Boston, MA, Dec., 2002
-
(2002)
Proceedings of the 5th Symposium on Operating Systems Design and Implementation
-
-
Whitaker, A.1
Shaw, M.2
Gribble, S. D.3
|