메뉴 건너뛰기




Volumn , Issue , 2004, Pages

Ostia: A Delegating Architecture for Secure System Call Interposition

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER ARCHITECTURE; NETWORK ARCHITECTURE;

EID: 85180406262     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (105)

References (39)
  • 2
    • 85084161234 scopus 로고    scopus 로고
    • MAPbox: Using parameterized behavior classes to confine untrusted applications
    • Aug
    • A. Acharya and M. Raje. MAPbox: Using parameterized behavior classes to confine untrusted applications. In Proc. 9th USENIX Security Symposium, Aug. 2000.
    • (2000) Proc. 9th USENIX Security Symposium
    • Acharya, A.1    Raje, M.2
  • 6
    • 0008312292 scopus 로고
    • Watchdogs: Extending the UNIX file system
    • Dallas, TX, Winter
    • B. N. Bershad and C. B. Pinkerton. Watchdogs: Extending the UNIX file system. In USENIX Conference Proceedings, pages 267–75, Dallas, TX, Winter 1988.
    • (1988) USENIX Conference Proceedings , pp. 267-275
    • Bershad, B. N.1    Pinkerton, C. B.2
  • 7
    • 0030092390 scopus 로고    scopus 로고
    • Checking for race conditions in file accesses
    • Spring
    • M. Bishop and M. Dilger. Checking for race conditions in file accesses. Computing Systems, 9(2):131–152, Spring 1996.
    • (1996) Computing Systems , vol.9 , Issue.2 , pp. 131-152
    • Bishop, M.1    Dilger, M.2
  • 14
  • 16
    • 85180527583 scopus 로고    scopus 로고
    • Traps and pitfalls: Practical problems in system call interposition based security tools
    • February
    • T. Garfinkel. Traps and pitfalls: Practical problems in system call interposition based security tools. In Proc. Network and Distributed Systems Security Symposium, February 2003.
    • (2003) Proc. Network and Distributed Systems Security Symposium
    • Garfinkel, T.1
  • 21
    • 85180753454 scopus 로고    scopus 로고
    • User-level infrastructure for system call interposition: A platform for intrusion detection and confinement
    • K. Jain and R. Sekar. User-level infrastructure for system call interposition: A platform for intrusion detection and confinement. In Proc. Network and Distributed Systems Security Symposium, 2000.
    • (2000) Proc. Network and Distributed Systems Security Symposium
    • Jain, K.1    Sekar, R.2
  • 22
    • 0027808377 scopus 로고
    • Interposition agents: Transparently interposing user code at the system interface
    • M. B. Jones. Interposition agents: Transparently interposing user code at the system interface. In Symposium on Operating Systems Principles, pages 80–93, 1993.
    • (1993) Symposium on Operating Systems Principles , pp. 80-93
    • Jones, M. B.1
  • 25
    • 0001916468 scopus 로고
    • Mach: A new kernel foundation for UNIX development
    • M. Accetta et al. Mach: A new kernel foundation for UNIX development. In Proc. USENIX Summer Conference, 1986.
    • (1986) Proc. USENIX Summer Conference
    • Accetta, M.1
  • 26
    • 85180537560 scopus 로고    scopus 로고
    • lc
    • B. Marick. lc. ftp://ftp.qucis.queensu.ca/pub/software-eng/software/Cmetrics/lc. tar.gz%.
    • Marick, B.1
  • 31
    • 84878346861 scopus 로고    scopus 로고
    • Improving host security with system call policies
    • august
    • N. Provos. Improving host security with system call policies. In Proc. 12th USENIX Security Symposium, pages 257–272, august 2003.
    • (2003) Proc. 12th USENIX Security Symposium , pp. 257-272
    • Provos, N.1
  • 38
    • 84919195742 scopus 로고
    • Pseudo devices: User-level extensions to the Sprite file system
    • San Francisco, CA
    • B. Welch and J. Ousterhout. Pseudo devices: User-level extensions to the Sprite file system. In Summer 1988 USENIX Conference, pages 37–49, San Francisco, CA, 1988.
    • (1988) Summer 1988 USENIX Conference , pp. 37-49
    • Welch, B.1    Ousterhout, J.2
  • 39
    • 84944248021 scopus 로고    scopus 로고
    • Intrusion detection using variable length audit trail patterns
    • A. Wespi, M. Dacier, and H. Debar. Intrusion detection using variable length audit trail patterns. In RAID 2000, pages 110–129, 2000.
    • (2000) RAID 2000 , pp. 110-129
    • Wespi, A.1    Dacier, M.2    Debar, H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.