Sandbox
Last Update : 2005/01/22
-
R. Wahbe, S. Lucco, T. Anderson, and S. Graham,
Efficient software-based fault isolation,
In Proceedings of the 14th ACM Symposium on Operating Systems Principles, pp. 203--216, Dec. 1993.
[paper]
-
A. Berman, V. Bourassa, E. Selberg,
TRON: Process-Specific File Protection for the UNIX Operating System
In Proceedings of the 1995 USENIX Winter Technical Conference, pp. 165-175, 1995
[paper]
-
I. Goldberg, D. Wagner, R. Thomas, E. Brewer,
A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker,
In Proceedings of the 6th USENIX security symposium, pp. 1--13, 1996.
[paper]
-
G. Necula, P. Lee,
Safe Kernel Extensions Without Run-Time Checking,
In Proceedings of the Second USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 229--243, Oct. 1996.
[paper]
-
L. Gong, M. Mueller, H. Prafullchandra, R. Schemers,
Going beyond the sandbox: an overview of the new security architecture in the Java Development Kit 1.2,
In Proceedings of the USENIX Symposium on Internet Technologies and Systems, pp. 103--112, Dec. 1997.
[paper]
-
Dan, Mohindra, Ramaswami, Sitaram
A. Dan, A. Mohindra, R. Ramaswami, D. Sitaram,
Available at http://domino.watson.ibm.com/library/CYBERDIG.NSF/0/3879e9214044d81f8525659300722bfc?OpenDocument ,1997.
[paper]
-
C. Jensen, D. Hagimont,
Protection Reconfiguration for Reusable Software,
In Proceedings of the 2nd Euromicro Conference on Software Maintenance and Reengineering, pp. 74--80, Mar. 1998.
[paper]
-
C. Jensen, D. Hagimont,
Protection Wrappers: A Simple and Portable Sandbox for Untrusted Applications,
In Proceedings of the 8th ACM SIGOPS European Workshop 1998, pp. 104--110, 1998.
[paper]
-
A. Alexandrov, P. Kmiec, K. Schauser,
Consh: A Confined Execu-tion Environment for Internet Computations,
Available at http://www.cs.ucsb.edu/~berto/papers/99-usenix-consh.ps , Dec. 1998.
[paper]
-
J. Ousterhout, J. Levy, B. Welch,
The Safe-Tcl Security Model,
Mobile Agent Security, Lecture Notes in Computer Science No. 1419, pp. 217-234, 1998.
[paper]
-
D. Wagner,
Janus: an approach for confinement of untrusted applications,
Technical Report CSD-99-1056, 12, 1999.
[paper]
-
L. Stein,
SBOX: Put CGI Scripts in a Box,
In Proceedings of the 1999 USENIX Annual Technical Conference, General Track, pp. 145-155, 1999
[paper]
-
T. Fraser, L. Badger, M. Feldman,
Hardening COTS software with generic software wrappers,
In IEEE Symposium on Security and Privacy, pp. 2--16, 1999.
[paper]
-
M. Raje,
Behavior-based Confinement of Untrusted Applications,
Technical Report TRCS99-12, Dept of Computer Science, University of California, Santa Barbara, Jan 1999.
[paper]
-
C. Cowan, S. Beattie, G. Kroah-Hartman, C. Pu, P. Wagle, V. Gligor,
SubDomain: Parsimonious Server Security,
In Proceedings of the 14th USENIX Systems Administration Conference (LISA 2000), pp. 355--367, Dec. 2000.
[paper]
-
D. Balfanz, D. Simon,
WindowBox: A Simple Security Model for the Connected Desktop,
In Proceedings of the 4th USENIX Windows Systems Symposium, Aug. 2000.
[paper]
-
A. Acharya, M. Raje,
Mapbox: Using parameterized behavior classes to confine applications.
In Proceedings of the USENIX Security Symposium, pp. 1--17, Aug. 2000.
[paper]
-
M. Bernaschi, E. Gabrielli, L. Mancini,
Enhancements to the Linux Kernel for Blocking Buffer Overflow Based Attacks,
In Proceedings of Annual Linux Showcase 2000, 2000.
[paper]
-
F. Chang, A. Itzkovitz, V. Karamcheti,
User-level Resource-Constrained Sandboxing,
In Proceedings of th 4th USENIX Windows Systems Symposium, pp. 25--36, Aug. 2000.
[paper]
-
大山恵弘, 加藤和彦,
SecurePot: システムコールフックを利用した安全なソフトウェア実行系, Sep. 2001.
[paper]
-
S. Chari, P. Cheng, BlueBox : A Policy-Driven, Host-Based Intrusion Detection System,
In Proceedings of Network and Distributed System Security Symposium Conference 2002 (NDSS'02), pp. 173--200, 2002.
[paper]
-
D. Peterson, M. Bishop, R. Pandey,
A Flexible Containment Mechanism for Executing Untrusted Code,
In Proceedings of the 11th USENIX Security Symposium, pp. 207-225, Aug. 2002.
[paper]
-
大山恵弘, 神田勝規, 加藤和彦,
安全なソフトウェア実行システムoftwarePotの設計と実装
コンピュータソフトウエアVol. 19, No. 6, Nov. 2002
[paper]
-
N. Provos,
Improving Host Security with System Call Policies,
In Proceedings of the 12th USENIX Security Symposium, pp. 257-272, Aug. 2003.
[paper]
戻る
SSRトップへ