The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Sandboxing with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1998-2004 (15) 2005-2006 (21) 2007-2009 (17) 2010-2012 (20) 2013-2015 (25) 2016-2018 (19) 2019-2021 (23) 2022-2023 (23) 2024 (2)
Publication types (Num. hits)
article(45) inproceedings(114) phdthesis(6)
Venues (Conferences, Journals, ...)
CoRR(16) ACSAC(6) USENIX Security Symposium(4) AsiaCCS(3) CCS(3) IPDPS(3) login Usenix Mag.(3) MALWARE(3) APSys(2) CCGRID(2) CT-RSA(2) ESORICS(2) IEEE Secur. Priv.(2) Int. J. Inf. Sec.(2) ISCC(2) ISSS(2) More (+10 of total 113)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 78 occurrences of 59 keywords

Results
Found 165 publication records. Showing 165 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
22Pawel Jakub Dawidek, Mariusz Zaborski Sandboxing with Capsicum. Search on Bibsonomy login Usenix Mag. The full citation details ... 2014 DBLP  BibTeX  RDF
22Milos Subotic, Nemanja Fimic, Darko Dejanovic, Goran Miljkovic A method for system calls sandboxing based on atomic trusted code region. Search on Bibsonomy ICCE-Berlin The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Michael Maass, William L. Scherlis, Jonathan Aldrich In-nimbo sandboxing. Search on Bibsonomy HotSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
22Jeroen Ooms The RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
22Damien Cassou, Stéphane Ducasse, Nicolas Petton SafeJS: Hermetic Sandboxing for JavaScript. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
22Hideaki Kawabata, Takamasa Isohara, Keisuke Takemori, Ayumu Kubota, Junya Kani, Harunobu Agematsu, Masakatsu Nishigaki SanAdBox: Sandboxing third party advertising libraries in a mobile application. Search on Bibsonomy ICC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Taesoo Kim, Nickolai Zeldovich Practical and Effective Sandboxing for Non-root Users. Search on Bibsonomy USENIX Annual Technical Conference The full citation details ... 2013 DBLP  BibTeX  RDF
22Hongyuan Qiu, Fernando C. Colón Osorio Static malware detection with Segmented Sandboxing. Search on Bibsonomy MALWARE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
22Ankur Taly Sandboxing untrusted JavaScript. Search on Bibsonomy 2013   RDF
22Nuwan Goonasekera, William J. Caelli, Colin J. Fidge A Hardware Virtualization Based Component Sandboxing Architecture. Search on Bibsonomy J. Softw. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Luke Dalessandro, Michael L. Scott Sandboxing transactional memory. Search on Bibsonomy PACT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Zhengqin Luo, Tamara Rezk Mashic Compiler: Mashup Sandboxing Based on Inter-frame Communication. Search on Bibsonomy CSF The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Jeff Terrace, Stephen R. Beard, Naga Praveen Kumar Katta JavaScript in JavaScript (js.js): Sandboxing Third-Party Scripts. Search on Bibsonomy WebApps The full citation details ... 2012 DBLP  BibTeX  RDF
22Mengtao Sun, Gang Tan JVM-Portable Sandboxing of Java's Native Libraries. Search on Bibsonomy ESORICS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Pieter Agten, Steven Van Acker, Yoran Brondsema, Phu H. Phung, Lieven Desmet, Frank Piessens JSand: complete client-side sandboxing of third-party JavaScript without browser modifications. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Martin Johns, Joachim Posegga WebSand: Server-Driven Outbound Web-Application Sandboxing. Search on Bibsonomy TrustBus The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
22Chris Greamo, Anup Ghosh Sandboxing and Virtualization: Modern Tools for Combating Malware. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Bin Zeng 0004, Gang Tan, Greg Morrisett Combining control-flow integrity and static analysis for efficient and validated data sandboxing. Search on Bibsonomy CCS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Faisal Al Ameiri, Khaled Salah 0001 Evaluation of popular application sandboxing. Search on Bibsonomy ICITST The full citation details ... 2011 DBLP  BibTeX  RDF
22Joe Gibbs Politz, Spiridon Aristides Eliopoulos, Arjun Guha, Shriram Krishnamurthi ADsafety: Type-Based Verification of JavaScript Sandboxing. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2011 DBLP  BibTeX  RDF
22Jason Ansel, Petr Marchenko, Úlfar Erlingsson, Elijah Taylor, Brad Chen, Derek L. Schuff, David Sehr, Cliff Biffle, Bennet Yee Language-independent sandboxing of just-in-time compilation and self-modifying code. Search on Bibsonomy PLDI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Stanley Bak, Karthik Manamcheri, Sayan Mitra, Marco Caccamo Sandboxing Controllers for Cyber-Physical Systems. Search on Bibsonomy ICCPS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Youhui Zhang, Yanhua Li, Weimin Zheng Using User-Level Virtualization in Desktop Grid Clients for Application Delivery and Sandboxing. Search on Bibsonomy PAAP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
22Csaba Attila Marosi, Péter Kacsuk, Gilles Fedak, Oleg Lodygensky Sandboxing for Desktop Grids Using Virtualization. Search on Bibsonomy PDP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF virtualization, desktop grids, sandbox
22Andreas Dewald, Thorsten Holz, Felix C. Freiling ADSandbox: sandboxing JavaScript to fight malicious websites. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF dynamic analysis, malicious software, drive-by downloads
22Alexandros Zaharis, Adamantini Martini, Leonidas Perlepes, Georgios I. Stamoulis, Panayotis Kikiras Live forensics framework for wireless sensor nodes using sandboxing. Search on Bibsonomy Q2SWinet The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
22Lei Liu 0021 Multi-level Sandboxing Techniques for Execution-based Stealthy Malware Detection. Search on Bibsonomy 2010   RDF
22Hrushikesha Mohanty, Martha VenkataSwamy, Srini Ramaswamy, R. K. Shyamasundar Translating Security Policy to Executable Code for Sandboxing Linux Kernel. Search on Bibsonomy EMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Hrushikesha Mohanty, Martha VenkataSwamy, Pillalamarri Thilak, Srinivasan Ramaswamy Secured Networking by Sandboxing LINUX 2.6. Search on Bibsonomy SMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22A. Tanoue, Makoto Shimamura, Miyuki Hanaoka, Kenji Kono FlexBox: Sandboxing internet servers based on layer-7 contexts. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Bryan Ford, Russ Cox Vx32: Lightweight User-level Sandboxing on the x86. Search on Bibsonomy USENIX Annual Technical Conference The full citation details ... 2008 DBLP  BibTeX  RDF
22Matthew Smith 0001, Thomas Friese, Michael Engel, Bernd Freisleben Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques. Search on Bibsonomy J. Parallel Distributed Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Edjozane Cavalcanti, Leonardo De Assis, Matheus Gaudencio, Walfredo Cirne, Francisco Vilar Brasileiro Sandboxing for a free-to-join grid with support for secure site-wide storage area. Search on Bibsonomy VTDC@SC The full citation details ... 2006 DBLP  BibTeX  RDF
22Hajime Inoue Inferring Java Security Policies Through Dynamic Sandboxing. Search on Bibsonomy PLC The full citation details ... 2005 DBLP  BibTeX  RDF
22Vassilis Prevelakis, Diomidis Spinellis Sandboxing Applications. Search on Bibsonomy USENIX Annual Technical Conference, FREENIX Track The full citation details ... 2001 DBLP  BibTeX  RDF
17Ville Karavirta, Petri Ihantola Serverless automatic assessment of Javascript exercises. Search on Bibsonomy ITiCSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF programming exercises, javascript, automatic assessment
17Tathagata Das, Prashanth Mohan, Venkata N. Padmanabhan, Ramachandran Ramjee, Asankhaya Sharma PRISM: platform for remote sensing using smartphones. Search on Bibsonomy MobiSys The full citation details ... 2010 DBLP  DOI  BibTeX  RDF mobile sandbox, opportunistic sensing, smart phones, mobile platform, participatory sensing
17Frank Siebenlist Challenges and opportunities for virtualized security in the clouds. Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF distributed policy enforcement, cloud computing, virtual machine, sandbox
17Prateek Saxena, R. Sekar 0001, Varun Puranik Efficient fine-grained binary instrumentationwith applications to taint-tracking. Search on Bibsonomy CGO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF binary analysis/rewriting, taint tracking, information flow
17Ruo Ando, Youki Kadobayashi, Yoichi Shinoda An Enhancement of Trusted Domain Enforcement using VMM Interruption Mechanism. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Ram Kumar 0001, Eddie Kohler, Mani B. Srivastava Harbor: software-based memory protection for sensor nodes. Search on Bibsonomy IPSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software fault isolation, memory protection
17Onur Aciiçmez Yet another MicroArchitectural Attack: : exploiting I-Cache. Search on Bibsonomy CSAW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MicroArchitectural analysis, RSA, side channel analysis, instruction cache, Montgomery Multiplication, modular exponentiation
17Håvard D. Johansen, Dag Johansen, Robbert van Renesse FirePatch: Secure and Time-Critical Dissemination of Software Patches. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Jeffrey Mark Siskind, Barak A. Pearlmutter First-class nonstandard interpretations by opening closures. Search on Bibsonomy POPL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF lambda lifting, referential transparency
17Onur Aciiçmez, Çetin Kaya Koç, Jean-Pierre Seifert Predicting Secret Keys Via Branch Prediction. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Simultaneous Multi-threading, RSA, Branch Prediction, Side Channel Analysis, Montgomery Multiplication, Modular Exponentiation
17Patrick Klinkoff, Christopher Krügel, Engin Kirda, Giovanni Vigna Extending .NET Security to Unmanaged Code. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Richard West, Gabriel Parmer Application-Specific Service Technologies for Commodity Operating Systems in Real-Time Environments. Search on Bibsonomy IEEE Real Time Technology and Applications Symposium The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Dag Arne Osvik, Adi Shamir, Eran Tromer Cache Attacks and Countermeasures: The Case of AES. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cache, cryptanalysis, AES, side-channel attack, memory access
17Lap-Chung Lam, Tzi-cker Chiueh A General Dynamic Information Flow Tracking Framework for Security Applications. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17David von Oheimb, Volkmar Lotz, Georg Walter Analyzing SLE 88 memory management security using Interacting State Machines. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Security, Smart cards, Memory management, Formal analysis, Isabelle/HOL
17Rean Griffith, Gail E. Kaiser Manipulating managed execution runtimes to support self-healing systems. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2005 DBLP  DOI  BibTeX  RDF CLR, common language runtime, online reconfiguration, autonomic computing, JIT compiler, self-healing systems
17Matthew Smith 0001, Thomas Friese, Bernd Freisleben Intra-engine service security for grids based on WSRF. Search on Bibsonomy CCGRID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Jirí Denemark, Michal Jankowski, Ales Krenek, Ludek Matyska, Norbert Meyer, Miroslav Ruda, Pawel Wolniewicz Best Practices of User Account Management with Virtual Organization Based Access to Grid. Search on Bibsonomy PPAM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Simon Winwood, Manuel M. T. Chakravarty Secure Untrusted Binaries - Provably!. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Gaurav S. Kc, Angelos D. Keromytis e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Andy Davis, Jay Parikh, William E. Weihl Edgecomputing: extending enterprise applications to the edge of the internet. Search on Bibsonomy WWW (Alternate Track Papers & Posters) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF edge computing, split-tier applications, Web services, grid computing, web applications, distributed applications, Internet applications, utility computing, N-tier applications
17Xin Qi, Gabriel Parmer, Richard West An efficient end-host architecture for cluster communication. Search on Bibsonomy CLUSTER The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Osamu Sato, Richard Potter, Mitsuharu Yamamoto, Masami Hagiya UML Scrapbook and Realization of Snapshot Programming Environment. Search on Bibsonomy ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17David von Oheimb, Georg Walter, Volkmar Lotz A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Andrew A. Chien Architecture of the Entropia Distributed Computing System. Search on Bibsonomy IPDPS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Farag Azzedin, Muthucumaru Maheswaran Towards Trust-Aware Resource Management in Grid Computing Systems. Search on Bibsonomy CCGRID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Farag Azzedin, Muthucumaru Maheswaran Integrating Trust into Grid Resource Management Systems. Search on Bibsonomy ICPP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, Grid computing, trust, resource management system
17Timothy S. Souder, Spiros Mancoridis A Tool for Securely Integrating Legacy Systems into a Distributed Environment. Search on Bibsonomy WCRE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Valery Trifonov, Zhong Shao Safe and Principled Language Interoperation. Search on Bibsonomy ESOP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Stephane G. Belmon, Bennet S. Yee Mobile Agents and Intellectual Property Protection. Search on Bibsonomy Mobile Agents The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #165 of 165 (100 per page; Change: )
Pages: [<<][1][2]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license