-
2
-
-
85084161234
-
MAPbox: Using parameterized behavior classes to confine untrusted applications
-
Aug
-
A. Acharya and M. Raje. MAPbox: Using parameterized behavior classes to confine untrusted applications. In Proc. 9th USENIX Security Symposium, Aug. 2000.
-
(2000)
Proc. 9th USENIX Security Symposium
-
-
Acharya, A.1
Raje, M.2
-
5
-
-
84867854789
-
Remus: a security-enhanced operating system
-
M. Bernaschi, E. Gabrielli, and L. V. Mancini. Remus: a security-enhanced operating system. ACM Trans. Information and System Security (TISSEC), 5(1):36–61, 2002.
-
(2002)
ACM Trans. Information and System Security (TISSEC)
, vol.5
, Issue.1
, pp. 36-61
-
-
Bernaschi, M.1
Gabrielli, E.2
Mancini, L. V.3
-
6
-
-
0008312292
-
Watchdogs: Extending the UNIX file system
-
Dallas, TX, Winter
-
B. N. Bershad and C. B. Pinkerton. Watchdogs: Extending the UNIX file system. In USENIX Conference Proceedings, pages 267–75, Dallas, TX, Winter 1988.
-
(1988)
USENIX Conference Proceedings
, pp. 267-275
-
-
Bershad, B. N.1
Pinkerton, C. B.2
-
7
-
-
0030092390
-
Checking for race conditions in file accesses
-
Spring
-
M. Bishop and M. Dilger. Checking for race conditions in file accesses. Computing Systems, 9(2):131–152, Spring 1996.
-
(1996)
Computing Systems
, vol.9
, Issue.2
, pp. 131-152
-
-
Bishop, M.1
Dilger, M.2
-
10
-
-
1542697134
-
Subdomain: Parsimonious server security
-
Dec
-
C. Cowan, S. Beattie, G. Kroach-Hartman, C. Pu, P. Wagle, and V. Gligor. Subdomain: Parsimonious server security. In Proc. Systems Administration Conference, Dec. 2000.
-
(2000)
Proc. Systems Administration Conference
-
-
Cowan, C.1
Beattie, S.2
Kroach-Hartman, G.3
Pu, C.4
Wagle, P.5
Gligor, V.6
-
12
-
-
33947108834
-
-
Technical Report 20742, IBM T.J. Watson Research Center, Sept
-
A. Dan, A. Mohindra, R. Ramaswami, and D. Sitaram. Chakravyuha (CV): A sandbox operating system environment for controlled execution of alien code. Technical Report 20742, IBM T.J. Watson Research Center, Sept. 1997.
-
(1997)
Chakravyuha (CV): A sandbox operating system environment for controlled execution of alien code
-
-
Dan, A.1
Mohindra, A.2
Ramaswami, R.3
Sitaram, D.4
-
16
-
-
85180527583
-
Traps and pitfalls: Practical problems in system call interposition based security tools
-
February
-
T. Garfinkel. Traps and pitfalls: Practical problems in system call interposition based security tools. In Proc. Network and Distributed Systems Security Symposium, February 2003.
-
(2003)
Proc. Network and Distributed Systems Security Symposium
-
-
Garfinkel, T.1
-
17
-
-
0003246945
-
SLIC: An extensibility system for commodity operating systems
-
June
-
D. P. Ghormley, D. Petrou, S. H. Rodrigues, and T. E. Anderson. SLIC: An extensibility system for commodity operating systems. In Proc. USENIX Annual Technical Conference, pages 39–52, June 1998.
-
(1998)
Proc. USENIX Annual Technical Conference
, pp. 39-52
-
-
Ghormley, D. P.1
Petrou, D.2
Rodrigues, S. H.3
Anderson, T. E.4
-
19
-
-
0038145552
-
UNIX as an application program
-
D. B. Golub, R. W. Dean, A. Forin, and R. F. Rashid. UNIX as an application program. In USENIX Summer, pages 87–95, 1990.
-
(1990)
USENIX Summer
, pp. 87-95
-
-
Golub, D. B.1
Dean, R. W.2
Forin, A.3
Rashid, R. F.4
-
20
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
S. A. Hofmeyr, S. Forrest, and A. Somayaji. Intrusion detection using sequences of system calls. Journal of Computer Security, 6(3):151–180, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S. A.1
Forrest, S.2
Somayaji, A.3
-
21
-
-
85180753454
-
User-level infrastructure for system call interposition: A platform for intrusion detection and confinement
-
K. Jain and R. Sekar. User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. In Proc. Network and Distributed Systems Security Symposium, 2000.
-
(2000)
Proc. Network and Distributed Systems Security Symposium
-
-
Jain, K.1
Sekar, R.2
-
22
-
-
0027808377
-
Interposition agents: Transparently interposing user code at the system interface
-
M. B. Jones. Interposition agents: Transparently interposing user code at the system interface. In Symposium on Operating Systems Principles, pages 80–93, 1993.
-
(1993)
Symposium on Operating Systems Principles
, pp. 80-93
-
-
Jones, M. B.1
-
25
-
-
0001916468
-
Mach: A new kernel foundation for UNIX development
-
M. Accetta et al. Mach: A new kernel foundation for UNIX development. In Proc. USENIX Summer Conference, 1986.
-
(1986)
Proc. USENIX Summer Conference
-
-
Accetta, M.1
-
26
-
-
85180537560
-
-
lc
-
B. Marick. lc. ftp://ftp.qucis.queensu.ca/pub/software-eng/software/Cmetrics/lc. tar.gz%.
-
-
-
Marick, B.1
-
27
-
-
0003972113
-
-
Addison-Wesley
-
M. K. McKusick, K. Bostic, M. J. Karels, and J. S. Quarter-man. The Design and Implementation of the 4.4 BSD Operating System, pages 112–114. Addison-Wesley, 1996.
-
(1996)
The Design and Implementation of the 4.4 BSD Operating System
, pp. 112-114
-
-
McKusick, M. K.1
Bostic, K.2
Karels, M. J.3
Quarter-man, J. S.4
-
31
-
-
84878346861
-
Improving host security with system call policies
-
august
-
N. Provos. Improving host security with system call policies. In Proc. 12th USENIX Security Symposium, pages 257–272, august 2003.
-
(2003)
Proc. 12th USENIX Security Symposium
, pp. 257-272
-
-
Provos, N.1
-
37
-
-
85084161648
-
Confining root programs with domain and type enforcement
-
July
-
K. M. Walker, D. F. S. anad M. L. Badger, M. J. Petkac, D. L. Shermann, and K. A. Oostendorp. Confining root programs with domain and type enforcement. In Proceedings of the sixth USENIX Security Symposium, July 1996.
-
(1996)
Proceedings of the sixth USENIX Security Symposium
-
-
Walker, K. M.1
anad, D. F. S.2
Badger, M. L.3
Petkac, M. J.4
Shermann, D. L.5
Oostendorp, K. A.6
-
38
-
-
84919195742
-
Pseudo devices: User-level extensions to the Sprite file system
-
San Francisco, CA
-
B. Welch and J. Ousterhout. Pseudo devices: User-level extensions to the Sprite file system. In Summer 1988 USENIX Conference, pages 37–49, San Francisco, CA, 1988.
-
(1988)
Summer 1988 USENIX Conference
, pp. 37-49
-
-
Welch, B.1
Ousterhout, J.2
-
39
-
-
84944248021
-
Intrusion detection using variable length audit trail patterns
-
A. Wespi, M. Dacier, and H. Debar. Intrusion detection using variable length audit trail patterns. In RAID 2000, pages 110–129, 2000.
-
(2000)
RAID 2000
, pp. 110-129
-
-
Wespi, A.1
Dacier, M.2
Debar, H.3
|