Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
108 | Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh |
Accurate Application-Specific Sandboxing for Win32/Intel Binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 375-382, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
91 | Yoshihiro Oyama, Koichi Onoue, Akinori Yonezawa |
Speculative Security Checks in Sandboxing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), CD-ROM / Abstracts Proceedings, 4-8 April 2005, Denver, CO, USA, 2005, IEEE Computer Society, 0-7695-2312-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
85 | Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh |
How to Automatically and Accurately Sandbox Microsoft IIS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 213-222, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
74 | Manigandan Radhakrishnan, Jon A. Solworth |
Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA, pp. 211-220, 2007, IEEE Computer Society, 0-7695-3060-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
74 | Takahiro Shinagawa, Kenji Kono, Takashi Masuda |
Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Software Security -- Theories and Systems, Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers, pp. 172-184, 2002, Springer, 3-540-00708-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
65 | Lap-Chung Lam, Tzi-cker Chiueh |
Automatic Extraction of Accurate Application-Specific Sandboxing Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 1-20, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
system call graph, non-deterministic finite state automaton, intrusion detection, sandboxing, mimicry attack |
59 | Pietro Cicotti, Michela Taufer, Andrew A. Chien |
DGMonitor: A Performance Monitoring Tool for Sandbox-Based Desktop Grid Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 34(2), pp. 113-133, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
performance monitoring and profiling, sandboxing techniques, distributed computing |
59 | Pietro Cicotti, Michela Taufer, Andrew A. Chien |
DGMonitor: A Performance Monitoring Tool for Sandbox-Based Desktop Grid Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), CD-ROM / Abstracts Proceedings, 26-30 April 2004, Santa Fe, New Mexico, USA, 2004, IEEE Computer Society, 0-7695-2132-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Performance monitoring and profiling, sandboxing techniques, distributed computing |
56 | Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakrishnan |
Data Sandboxing: A Technique for Enforcing Confidentiality Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 223-234, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Patrick Klinkoff, Engin Kirda, Christopher Kruegel, Giovanni Vigna |
Extending .NET security to unmanaged code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 6(6), pp. 417-428, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
NET Security, Unmanaged Code, Sandboxing |
39 | René Rydhof Hansen, Christian W. Probst, Flemming Nielson |
Sandboxing in myKlaim. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 174-181, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Koichi Onoue, Yoshihiro Oyama, Akinori Yonezawa |
Control of system calls from outside of virtual machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 2116-1221, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, virtual machine monitors, sandboxing, system call interception |
25 | Weiqing Sun, R. Sekar 0001, Zhenkai Liang, V. N. Venkatakrishnan |
Expanding Malware Defense by Securing Software Installations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings, pp. 164-185, 2008, Springer, 978-3-540-70541-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Untrusted code, Software installation, Malicious code, Sandboxing |
25 | Walfredo Cirne, Francisco Vilar Brasileiro, Nazareno Andrade, Lauro Costa, Alisson Andrade, Reynaldo Novaes, Miranda Mowbray |
Labs of the World, Unite!!! ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Grid Comput. ![In: J. Grid Comput. 4(3), pp. 225-246, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
free-to-join Grids, incentive to collaborate, peer-to-peer Grids, Grid computing, Grid scheduling, sandboxing |
25 | Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting |
System Call Monitoring Using Authenticated System Calls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 3(3), pp. 216-229, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
operating systems, security policy, Intrusion tolerance, compiler techniques, sandboxing |
25 | Stelios Sidiroglou, Angelos D. Keromytis |
Countering Network Worms Through Automatic Patch Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(6), pp. 41-49, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
software patching, process sandboxing, Worms, buffer overflows, honeypots, viruses, memory protection |
25 | Suresh Chari, Pau-Chen Cheng |
BlueBoX: A policy-driven, host-based intrusion detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(2), pp. 173-200, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
system call introspection, Intrusion detection, policy, sandboxing |
22 | Charalampos Mainas, Ioannis Plakas, Georgios Ntoutsos, Anastassios Nanos |
Sandboxing Functions for Efficient and Secure Multi-tenant Serverless Deployments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESAME@EuroSys ![In: Proceedings of the 2nd Workshop on SErverless Systems, Applications and MEthodologies, SESAME 2024, Athens, Greece, 22 April 2024, pp. 25-31, 2024, ACM. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Zachary Yedidia |
Lightweight Fault Isolation: Practical, Efficient, and Secure Software Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS (2) ![In: Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2, ASPLOS 2024, La Jolla, CA, USA, 27 April 2024- 1 May 2024, pp. 649-665, 2024, ACM. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Soo-Yee Lim, Xueyuan Han, Thomas Pasquier |
Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.01983, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Bojan Novkovic, Marin Golub |
Improving monolithic kernel security and robustness through intra-kernel sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 127, pp. 103104, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Yuki Nakata, Shintaro Suzuki, Katsuya Matsubara |
Reducing Attack Surface with Container Transplantation for Lightweight Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSys ![In: Proceedings of the 14th ACM SIGOPS Asia-Pacific Workshop on Systems, APSys 2023, Seoul, Republic of Korea, August 24-25, 2023, pp. 58-64, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Bingzhuo Zhong, Siyuan Liu, Marco Caccamo, Majid Zamani 0001 |
Towards Trustworthy AI: Sandboxing AI-Based Unverified Controllers for Safe and Secure Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDC ![In: 62nd IEEE Conference on Decision and Control, CDC 2023, Singapore, December 13-15, 2023, pp. 1833-1840, 2023, IEEE, 979-8-3503-0124-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Marco Abbadini, Michele Beretta, Dario Facchinetti, Gianluca Oldani, Matthew Rossi, Stefano Paraboschi |
Lightweight Cloud Application Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CloudCom ![In: IEEE International Conference on Cloud Computing Technology and Science, CloudCom 2023, Naples, Italy, December 4-6, 2023, pp. 139-146, 2023, IEEE, 979-8-3503-3982-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Soo-Yee Lim, Xueyuan Han, Thomas Pasquier |
Unleashing Unprivileged eBPF Potential with Dynamic Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eBPF@SIGCOMM ![In: Proceedings of the 1st Workshop on eBPF and Kernel Extensions, eBPF 2023, New York, NY, USA, 10 September 2023, pp. 42-48, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Maqsood Ahmad 0001, Francesco Bergadano, Valerio Costamagna, Bruno Crispo, Giovanni Russello |
AppBox: A Black-Box Application Sandboxing Technique for Mobile App Management Solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: IEEE Symposium on Computers and Communications, ISCC 2023, Gammarth, Tunisia, July 9-12, 2023, pp. 1-7, 2023, IEEE, 979-8-3503-0048-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Bingzhuo Zhong, Hongpeng Cao, Majid Zamani 0001, Marco Caccamo |
Towards Safe AI: Sandboxing DNNs-Based Controllers in Stochastic Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI ![In: Thirty-Seventh AAAI Conference on Artificial Intelligence, AAAI 2023, Thirty-Fifth Conference on Innovative Applications of Artificial Intelligence, IAAI 2023, Thirteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2023, Washington, DC, USA, February 7-14, 2023, pp. 15340-15349, 2023, AAAI Press, 978-1-57735-880-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Marco Abbadini, Dario Facchinetti, Gianluca Oldani, Matthew Rossi, Stefano Paraboschi |
NatiSand: Native Code Sandboxing for JavaScript Runtimes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2023, Hong Kong, China, October 16-18, 2023, pp. 639-653, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Marco Abbadini, Michele Beretta, Dario Facchinetti, Gianluca Oldani, Matthew Rossi, Stefano Paraboschi |
POSTER: Leveraging eBPF to enhance sandboxing of WebAssembly runtimes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, ASIA CCS 2023, Melbourne, VIC, Australia, July 10-14, 2023, pp. 1028-1030, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Evan Johnson 0001, Evan Laufer, Zijie Zhao, Dan Gohman, Shravan Narayan, Stefan Savage, Deian Stefan, Fraser Brown |
WaVe: a verifiably secure WebAssembly sandboxing runtime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SP ![In: 44th IEEE Symposium on Security and Privacy, SP 2023, San Francisco, CA, USA, May 21-25, 2023, pp. 2940-2955, 2023, IEEE, 978-1-6654-9336-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Bingzhuo Zhong |
Formal Methods for Sandboxing Controllers in Cyber-Physical Systems . ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
22 | Jingci Zhang, Jun Zheng 0007, Zheng Zhang, Tian Chen, Kefan Qiu, Quanxin Zhang, Yuanzhang Li |
Hybrid isolation model for device application sandboxing deployment in Zero Trust architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Syst. ![In: Int. J. Intell. Syst. 37(12), pp. 11167-11187, December 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Chunheng Zhao, Jasprit Singh Gill, Pierluigi Pisu, Gurcan Comert |
Detection of False Data Injection Attack in Connected and Automated Vehicles via Cloud-Based Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 23(7), pp. 9078-9088, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Bingzhuo Zhong, Hongpeng Cao, Majid Zamani 0001, Marco Caccamo |
Sandboxing (AI-based) Unverified Controllers in Stochastic Games: An Abstraction-based Approach with Safe-visor Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.14924, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Sunjay Cauligi, Marco Guarnieri, Daniel Moghimi, Deian Stefan, Marco Vassena |
A Turning Point for Verified Spectre Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.01548, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Lukas Brodschelm, Marcus Gelderie |
Application Sandboxing for Linux Desktops: A User-friendly Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 19th International Conference on Security and Cryptography, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022., pp. 317-324, 2022, SCITEPRESS, 978-989-758-590-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Jingci Zhang, Jun Zheng 0007, Zheng Zhang, Tian Chen, Kefan Qiu, Quanxin Zhang, Yuanzhang Li |
Hybrid Isolation Model for Device Application Sandboxing Deployment in Zero Trust Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS Workshops ![In: Applied Cryptography and Network Security Workshops - ACNS 2022 Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings, pp. 104-123, 2022, Springer, 978-3-031-16814-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Jay Bosamiya, Wen Shih Lim, Bryan Parno |
Provably-Safe Multilingual Software Sandboxing using WebAssembly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, pp. 1975-1992, 2022, USENIX Association, 978-1-939133-31-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
22 | Abidah Mat Taib, Ariff As-Syadiqin Abdullah, Muhammad Azizi Mohd Ariffin, Rafiza Ruslan |
Threats and Vulnerabilities Handling via Dual-stack Sandboxing Based on Security Mechanisms Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSCE ![In: 12th IEEE International Conference on Control System, Computing and Engineering, ICCSCE 2022, Penang, Malaysia, October 21-22, 2022, pp. 113-118, 2022, IEEE, 978-1-6654-8339-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Alexios Voulimeneas, Jonas Vinck, Ruben Mechelinck, Stijn Volckaert |
You shall not (by)pass!: practical, secure, and fast PKU-based sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: EuroSys '22: Seventeenth European Conference on Computer Systems, Rennes, France, April 5 - 8, 2022, pp. 266-282, 2022, ACM, 978-1-4503-9162-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Byron Denham, Dale R. Thompson |
Ransomware and Malware Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UEMCON ![In: 13th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, UEMCON 2022, New York, NY, USA, October 26-29, 2022, pp. 173-179, 2022, IEEE, 978-1-6654-9299-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Shravan Narayan |
Retrofitting fast and secure sandboxing in real systems ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2022 |
RDF |
|
22 | Bingzhuo Zhong, Majid Zamani 0001, Marco Caccamo |
Sandboxing Controllers for Stochastic Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2109.11264, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
22 | Alexios Voulimeneas, Jonas Vinck, Ruben Mechelinck, Stijn Volckaert |
Garmr: Defending the gates of PKU-based sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2110.04788, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
22 | Bingzhuo Zhong, Abolfazl Lavaei, Hongpeng Cao, Majid Zamani 0001, Marco Caccamo |
Safe-visor Architecture for Sandboxing (AI-based) Unverified Controllers in Stochastic Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2102.05490, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
22 | Pierre Thalamy, Benoît Piranda, Julien Bourgeois |
Engineering efficient and massively parallel 3D self-reconfiguration using sandboxing, scaffolding and coating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Robotics Auton. Syst. ![In: Robotics Auton. Syst. 146, pp. 103875, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Dongdong Huo, Chen Cao, Peng Liu 0005, Yazhe Wang, Mingxuan Li, Zhen Xu 0009 |
Commercial hypervisor-based task sandboxing mechanisms are unsecured? But we can fix it! ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Archit. ![In: J. Syst. Archit. 116, pp. 102114, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Wenna Song, Jiang Ming 0002, Lin Jiang, Yi Xiang, Xuanchen Pan, Jianming Fu, Guojun Peng |
Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021, pp. 2858-2874, 2021, ACM, 978-1-4503-8454-4. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Alexander Bulekov, Rasoul Jahanshahi, Manuel Egele |
Saphire: Sandboxing PHP Applications with Tailored System Call Allowlists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, pp. 2881-2898, 2021, USENIX Association, 978-1-939133-24-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
22 | Wanrong Ouyang, Baojian Hua |
RusBox: Towards Efficient and Adaptive Sandboxing for Rust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE Workshops ![In: IEEE International Symposium on Software Reliability Engineering, ISSRE 2021 - Workshops, Wuhan, China, October 25-28, 2021, pp. 1-2, 2021, IEEE, 978-1-6654-2603-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Shravan Narayan, Craig Disselkoen, Deian Stefan |
Tutorial: Sandboxing (unsafe) C code with RLBox. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecDev ![In: IEEE Secure Development Conference, SecDev 2021, Atlanta, GA, USA, October 18-20, 2021, pp. 11-12, 2021, IEEE, 978-1-6654-3170-5. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Michael Sammler, Deepak Garg 0001, Derek Dreyer, Tadeusz Litak |
The high-level benefits of low-level sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Program. Lang. ![In: Proc. ACM Program. Lang. 4(POPL), pp. 32:1-32:32, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Shankara Pailoor, Xinyu Wang 0006, Hovav Shacham, Isil Dillig |
Automated policy synthesis for system call sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Program. Lang. ![In: Proc. ACM Program. Lang. 4(OOPSLA), pp. 135:1-135:26, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | V. Joseph Raymond, R. Jeberson Retna Raj |
Reversing and auditing of android malicious applications using sandboxing environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Electron. Secur. Digit. Forensics ![In: Int. J. Electron. Secur. Digit. Forensics 12(4), pp. 386-396, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Tal Garfinkel, Shravan Narayan, Craig Disselkoen, Hovav Shacham, Deian Stefan |
The Road to Less Trusted Code: Lowering the Barrier to In-Process Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
login Usenix Mag. ![In: login Usenix Mag. 45(4), 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Stylianos Karagiannis, Emmanouil Magkos, Christoforos Ntantogian, Luís L. Ribeiro |
Sandboxing the Cyberspace for Cybersecurity Education and Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DETIPS/DeSECSys/MPS/SPOSE@ESORICS ![In: Computer Security - ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17-18, 2020, Revised Selected Papers, pp. 181-196, 2020, Springer, 978-3-030-66503-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Taemin Park |
Comprehensive Protection for Dynamically-typed Languages: Avoiding the Pitfalls of Language-level Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
22 | Zhiyuan Wan, David Lo 0001, Xin Xia 0001, Liang Cai |
Practical and effective sandboxing for Linux containers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Empir. Softw. Eng. ![In: Empir. Softw. Eng. 24(6), pp. 4034-4070, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Sashank Narain, Guevara Noubir |
Mitigating Location Privacy Attacks on Mobile Devices using Dynamic App Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2019(2), pp. 66-87, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Sahil Suneja, Canturk Isci |
Secure Extensibility for System State Extraction via Plugin Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1905.08192, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
22 | Shravan Narayan, Tal Garfinkel, Sorin Lerner, Hovav Shacham, Deian Stefan |
Gobi: WebAssembly as a Practical Path to Library Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1912.02285, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
22 | Camil Staps, John H. G. van Groningen, Rinus Plasmeijer |
Lazy interworking of compiled and interpreted code for sandboxing and distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFL ![In: IFL '19: Implementation and Application of Functional Languages, Singapore, September 25-27, 2019., pp. 9:1-9:12, 2019, ACM, 978-1-4503-7562-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Galal Hassan, Abdulmonem M. Rashwan, Hossam S. Hassanein |
SandBoxer: A Self-Contained Sensor Architecture for Sandboxing the Industrial Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC Workshops ![In: 17th IEEE International Conference on Communications Workshops, ICC Workshops 2019, Shanghai, China, May 20-24, 2019, pp. 1-6, 2019, IEEE, 978-1-7281-2373-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Hans-Petter Halvorsen, Alexander Jonsaas, Saba Mylvaganam |
Sandboxing for Cross-Platform Applications of Robots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ROSE ![In: 13th IEEE International Symposium on Robotic and Sensors Environments, ROSE 2019, Ottawa, ON, Canada, June 17-18, 2019, pp. 1-8, 2019, IEEE, 978-1-7281-1964-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Bingzhuo Zhong, Majid Zamani 0001, Marco Caccamo |
Sandboxing Controllers for Stochastic Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FORMATS ![In: Formal Modeling and Analysis of Timed Systems - 17th International Conference, FORMATS 2019, Amsterdam, The Netherlands, August 27-29, 2019, Proceedings, pp. 247-264, 2019, Springer, 978-3-030-29661-2. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Michael Witt 0001, Christoph Jansen, Dagmar Krefting, Achim Streit |
Sandboxing of biomedical applications in Linux containers based on system call evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 30(12), 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Sashank Narain, Guevara Noubir |
Mitigating Location Privacy Attacks on Mobile Devices using Dynamic App Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1808.04490, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
22 | Ashish Bijlani, Umakishore Ramachandran |
A Lightweight and Fine-grained File System Sandboxing Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSys ![In: Proceedings of the 9th Asia-Pacific Workshop on Systems, APSys 2018, Jeju Island, Republic of Korea, August 27-28, 2018, pp. 17:1-17:7, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Sharath Chandrashekhara, Taeyeon Ki, Karthik Dantu, Steven Y. Ko |
Duvel: Enabling Context-driven, Multi-profile Apps on Android through Storage Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EdgeSys@MobiSys ![In: Proceedings of the 1st International Workshop on Edge Systems, Analytics and Networking, EdgeSys@MobiSys 2018, Munich, Germany, June 10, 2018, pp. 31-36, 2018, ACM. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Tim Wambach |
Retrospektive Analyse der Ausbreitung und dynamische Erkennung von Web-Tracking durch Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2018 |
RDF |
|
22 | Biswa Sengupta, Eduard Vazquez, Michele Sasdelli, Yu Qian, Martin Peniak, L. Netherton, G. Delfino |
Large-scale image analysis using docker sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1703.02898, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
22 | Konrad Jamrozik, Andreas Zeller |
Mining Sandboxes for Security - Automatisches Sandboxing für Software-Sicherheit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Software Engineering ![In: Software Engineering 2017, Fachtagung des GI-Fachbereichs Softwaretechnik, 21.-24. Februar 2017, Hannover, Deutschland, pp. 111-112, 2017, GI, 978-3-88579-661-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
22 | Samuel Laurén, Sampsa Rauti, Ville Leppänen |
A Survey on Application Sandboxing Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CompSysTech ![In: Proceedings of the 18th International Conference on Computer Systems and Technologies, CompSysTech 2017, Ruse, Bulgaria, June 23-24, 2017, pp. 141-148, 2017, ACM, 978-1-4503-5234-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Miguel C. Neves, Kirill Levchenko, Marinho P. Barcellos |
Sandboxing Data Plane Programs for Fun and Profit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM Posters and Demos ![In: Posters and Demos Proceedings of the Conference of the ACM Special Interest Group on Data Communication, SIGCOMM 2017, Los Angeles, CA, USA, August 21-25, 2017, pp. 103-104, 2017, ACM, 978-1-4503-5057-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Christophe Bobda, Joshua Mead, Taylor J. L. Whitaker, Charles A. Kamhoua, Kevin A. Kwiat |
Hardware Sandboxing: A Novel Defense Paradigm Against Hardware Trojans in Systems on Chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARC ![In: Applied Reconfigurable Computing - 13th International Symposium, ARC 2017, Delft, The Netherlands, April 3-7, 2017, Proceedings, pp. 47-59, 2017, 978-3-319-56257-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Benjamin Lamowski, Carsten Weinhold, Adam Lackorzynski, Hermann Härtig |
Sandcrust: Automatic Sandboxing of Unsafe Components in Rust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLOS@SOSP ![In: Proceedings of the 9th Workshop on Programming Languages and Operating Systems, Shanghai, China, October 28, 2017, pp. 51-57, 2017, ACM, 978-1-4503-5153-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Michael Maass, Adam Sales, Benjamin Chung, Joshua Sunshine |
A systematic analysis of the science of sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PeerJ Comput. Sci. ![In: PeerJ Comput. Sci. 2, pp. e43, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Matthias Keil 0002, Peter Thiemann 0001 |
Transaction-based Sandboxing for JavaScript. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1612.00669, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
22 | Michael Backes 0001, Sven Bugiel, Oliver Schranz, Philipp von Styp-Rekowsky |
Boxify: Bringing Full-Fledged App Sandboxing to Stock Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
login Usenix Mag. ![In: login Usenix Mag. 41(2), 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
22 | Zhengqin Luo, José Fragoso Santos, Ana Almeida Matos, Tamara Rezk |
Mashic compiler: Mashup sandboxing based on inter-frame communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 24(1), pp. 91-136, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Yaoqi Jia, Zheng Leong Chua, Hong Hu 0004, Shuo Chen 0001, Prateek Saxena, Zhenkai Liang |
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016, pp. 791-804, 2016, ACM, 978-1-4503-4139-4. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Vitor Monte Afonso, Paulo L. de Geus, Antonio Bianchi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna, Adam Doupé, Mario Polino |
Going Native: Using a Large-Scale Analysis of Android Apps to Create a Practical Native-Code Sandboxing Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 23rd Annual Network and Distributed System Security Symposium, NDSS 2016, San Diego, California, USA, February 21-24, 2016, 2016, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
22 | Joshua Mead, Christophe Bobda, Taylor J. L. Whitaker |
Defeating drone jamming with hardware sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsianHOST ![In: 2016 IEEE Asian Hardware-Oriented Security and Trust, AsianHOST 2016, Yilan, Taiwan, December 19-20, 2016, pp. 1-6, 2016, IEEE Computer Society, 978-1-5090-5701-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Steven Van Acker, Andrei Sabelfeld |
JavaScript Sandboxing: Isolating and Restricting Client-Side JavaScript. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design VIII - FOSAD 2014/2015/2016 Tutorial Lectures, pp. 32-86, 2016, Springer, 978-3-319-43004-1. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Limin Jia 0001, Shayak Sen, Deepak Garg 0001, Anupam Datta |
System M: A Program Logic for Code Sandboxing and Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1501.05673, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
22 | Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi |
ADsafety: Type-Based Verification of JavaScript Sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1506.07813, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
22 | Nuwan Goonasekera, William J. Caelli, Colin J. Fidge |
LibVM: an architecture for shared library sandboxing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Pract. Exp. ![In: Softw. Pract. Exp. 45(12), pp. 1597-1617, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Antonio Bianchi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna |
NJAS: Sandboxing Unmodified Applications in non-rooted Devices Running stock Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPSM@CCS ![In: Proceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM 2015, Denver, Colorado, USA, October 12, 2015, pp. 27-38, 2015, ACM, 978-1-4503-3819-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Yajin Zhou, Kunal Patel, Lei Wu 0012, Zhi Wang 0004, Xuxian Jiang |
Hybrid User-level Sandboxing of Third-party Android Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015, pp. 19-30, 2015, ACM, 978-1-4503-3245-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Mihai Bucicoiu, Lucas Davi, Razvan Deaconescu, Ahmad-Reza Sadeghi |
XiOS: Extended Application Sandboxing on iOS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015, pp. 43-54, 2015, ACM, 978-1-4503-3245-3. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Liang Deng, Qingkai Zeng 0002, Yao Liu 0011 |
ISboxing: An Instruction Substitution Based Data Sandboxing for x86 Untrusted Libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings, pp. 386-400, 2015, Springer, 978-3-319-18466-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Alexander Adamov, Anders Carlsson |
A sandboxing method to protect cloud cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EWDTS ![In: 2015 IEEE East-West Design & Test Symposium, EWDTS 2015, Batumi, Georgia, September 26-29, 2015, pp. 1-3, 2015, IEEE Computer Society, 978-1-4673-7776-8. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Lena E. Olson, Jason Power, Mark D. Hill, David A. Wood 0001 |
Border control: sandboxing accelerators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: Proceedings of the 48th International Symposium on Microarchitecture, MICRO 2015, Waikiki, HI, USA, December 5-9, 2015, pp. 470-481, 2015, ACM, 978-1-4503-4034-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Michael Backes 0001, Sven Bugiel, Christian Hammer 0001, Oliver Schranz, Philipp von Styp-Rekowsky |
Boxify: Full-fledged App Sandboxing for Stock Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, August 12-14, 2015., pp. 691-706, 2015, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
22 | Gorka Irazoqui Apecechea, Thomas Eisenbarth 0001, Berk Sunar |
S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing - and Its Application to AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 2015 IEEE Symposium on Security and Privacy, SP 2015, San Jose, CA, USA, May 17-21, 2015, pp. 591-604, 2015, IEEE Computer Society, 978-1-4673-6949-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Fernando C. Colón Osorio, Hongyuan Qiu, Anthony Arrott |
Segmented sandboxing - A novel approach to Malware polymorphism detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 59-68, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Krishnendu Ghosh, Jose Andre Morales, William Casey, Bud Mishra |
Sandboxing and reasoning on malware infection trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MALWARE ![In: 10th International Conference on Malicious and Unwanted Software, MALWARE 2015, Fajardo, PR, USA, October 20-22, 2015, pp. 69-73, 2015, IEEE Computer Society, 978-1-5090-0317-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Asif Iqbal 0003, Hanan Al Obaidli, Mário Guimarães, Oliver Popov |
Sandboxing: aid in digital forensic research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Proceedings of the 2015 Information Security Curriculum Development Conference, InfoSecCD 2015, Kennesaw, GA, USA, October 10, 2015, pp. 3:1-3:5, 2015, ACM, 978-1-4503-4049-6. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
22 | Keith Bird |
Sandboxing: a line in the sand against malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2014(4), pp. 18-20, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
22 | Holger Machens |
Sandboxing for Software Transactional Memory with Deferred Updates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1409.5313, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|