Detecting and countering system intrusions using software wrappers

  • Authors:
  • Calvin Ko;Timothy Fraser;Lee Badger;Douglas Kilpatrick

  • Affiliations:
  • NAI Labs, Network Associates, Inc.;NAI Labs, Network Associates, Inc.;NAI Labs, Network Associates, Inc.;NAI Labs, Network Associates, Inc.

  • Venue:
  • SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
  • Year:
  • 2000

Quantified Score

Hi-index 0.00

Visualization

Abstract

Designing a suitable confinement mechanism to confine untrusted applications is challenging as such a mechanism needs to satisfy conflicting requirements. The main trade-off is between ease of use and flexibility. In this paper, we present the design, ...