Sandbox     Last Update : 2005/01/22



  1. R. Wahbe, S. Lucco, T. Anderson, and S. Graham, Efficient software-based fault isolation, In Proceedings of the 14th ACM Symposium on Operating Systems Principles, pp. 203--216, Dec. 1993. [paper]
  2. A. Berman, V. Bourassa, E. Selberg, TRON: Process-Specific File Protection for the UNIX Operating System In Proceedings of the 1995 USENIX Winter Technical Conference, pp. 165-175, 1995 [paper]
  3. I. Goldberg, D. Wagner, R. Thomas, E. Brewer, A Secure Environment for Untrusted Helper Applications: Confining the Wily Hacker, In Proceedings of the 6th USENIX security symposium, pp. 1--13, 1996. [paper]
  4. G. Necula, P. Lee, Safe Kernel Extensions Without Run-Time Checking, In Proceedings of the Second USENIX Symposium on Operating Systems Design and Implementation (OSDI), pages 229--243, Oct. 1996. [paper]
  5. L. Gong, M. Mueller, H. Prafullchandra, R. Schemers, Going beyond the sandbox: an overview of the new security architecture in the Java Development Kit 1.2, In Proceedings of the USENIX Symposium on Internet Technologies and Systems, pp. 103--112, Dec. 1997. [paper]
  6. Dan, Mohindra, Ramaswami, Sitaram A. Dan, A. Mohindra, R. Ramaswami, D. Sitaram, Available at http://domino.watson.ibm.com/library/CYBERDIG.NSF/0/3879e9214044d81f8525659300722bfc?OpenDocument ,1997. [paper]
  7. C. Jensen, D. Hagimont, Protection Reconfiguration for Reusable Software, In Proceedings of the 2nd Euromicro Conference on Software Maintenance and Reengineering, pp. 74--80, Mar. 1998. [paper]
  8. C. Jensen, D. Hagimont, Protection Wrappers: A Simple and Portable Sandbox for Untrusted Applications, In Proceedings of the 8th ACM SIGOPS European Workshop 1998, pp. 104--110, 1998. [paper]
  9. A. Alexandrov, P. Kmiec, K. Schauser, Consh: A Confined Execu-tion Environment for Internet Computations, Available at http://www.cs.ucsb.edu/~berto/papers/99-usenix-consh.ps , Dec. 1998. [paper]
  10. J. Ousterhout, J. Levy, B. Welch, The Safe-Tcl Security Model, Mobile Agent Security, Lecture Notes in Computer Science No. 1419, pp. 217-234, 1998. [paper]
  11. D. Wagner, Janus: an approach for confinement of untrusted applications, Technical Report CSD-99-1056, 12, 1999. [paper]
  12. L. Stein, SBOX: Put CGI Scripts in a Box, In Proceedings of the 1999 USENIX Annual Technical Conference, General Track, pp. 145-155, 1999 [paper]
  13. T. Fraser, L. Badger, M. Feldman, Hardening COTS software with generic software wrappers, In IEEE Symposium on Security and Privacy, pp. 2--16, 1999. [paper]
  14. M. Raje, Behavior-based Confinement of Untrusted Applications, Technical Report TRCS99-12, Dept of Computer Science, University of California, Santa Barbara, Jan 1999. [paper]
  15. C. Cowan, S. Beattie, G. Kroah-Hartman, C. Pu, P. Wagle, V. Gligor, SubDomain: Parsimonious Server Security, In Proceedings of the 14th USENIX Systems Administration Conference (LISA 2000), pp. 355--367, Dec. 2000. [paper]
  16. D. Balfanz, D. Simon, WindowBox: A Simple Security Model for the Connected Desktop, In Proceedings of the 4th USENIX Windows Systems Symposium, Aug. 2000. [paper]
  17. A. Acharya, M. Raje, Mapbox: Using parameterized behavior classes to confine applications. In Proceedings of the USENIX Security Symposium, pp. 1--17, Aug. 2000. [paper]
  18. M. Bernaschi, E. Gabrielli, L. Mancini, Enhancements to the Linux Kernel for Blocking Buffer Overflow Based Attacks, In Proceedings of Annual Linux Showcase 2000, 2000. [paper]
  19. F. Chang, A. Itzkovitz, V. Karamcheti, User-level Resource-Constrained Sandboxing, In Proceedings of th 4th USENIX Windows Systems Symposium, pp. 25--36, Aug. 2000. [paper]
  20. 大山恵弘, 加藤和彦, SecurePot: システムコールフックを利用した安全なソフトウェア実行系, Sep. 2001. [paper]
  21. S. Chari, P. Cheng, BlueBox : A Policy-Driven, Host-Based Intrusion Detection System, In Proceedings of Network and Distributed System Security Symposium Conference 2002 (NDSS'02), pp. 173--200, 2002. [paper]
  22. D. Peterson, M. Bishop, R. Pandey, A Flexible Containment Mechanism for Executing Untrusted Code, In Proceedings of the 11th USENIX Security Symposium, pp. 207-225, Aug. 2002. [paper]
  23. 大山恵弘, 神田勝規, 加藤和彦, 安全なソフトウェア実行システムoftwarePotの設計と実装 コンピュータソフトウエアVol. 19, No. 6, Nov. 2002 [paper]
  24. N. Provos, Improving Host Security with System Call Policies, In Proceedings of the 12th USENIX Security Symposium, pp. 257-272, Aug. 2003. [paper]

戻る
SSRトップへ