ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Secure composition of untrusted code: wrappers and causality types
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13
◽
10.1109/csfw.2000.856943
◽
2002
◽
Cited By ~ 14
Author(s):
P. Sewell
◽
J. Vitek
Keyword(s):
Untrusted Code
Download Full-text
Related Documents
Cited By
References
Proceedings of the first ACM workshop on Secure execution of untrusted code - SecuCode '09
10.1145/1655077
◽
2009
◽
Keyword(s):
Untrusted Code
Download Full-text
Hardware-enforced fine-grained isolation of untrusted code
Proceedings of the first ACM workshop on Secure execution of untrusted code - SecuCode '09
◽
10.1145/1655077.1655082
◽
2009
◽
Cited By ~ 4
Author(s):
Eugen Leontie
◽
Gedare Bloom
◽
Bhagirath Narahari
◽
Rahul Simha
◽
Joseph Zambreno
Keyword(s):
Fine Grained
◽
Untrusted Code
Download Full-text
Pollux VMM: A Virtual Machine Monitor for Executing Untrusted Code
2009 First International Conference on Information Science and Engineering
◽
10.1109/icise.2009.835
◽
2009
◽
Author(s):
Linfeng Zhang
◽
Yan Wen
◽
Kai Du
Keyword(s):
Virtual Machine
◽
Virtual Machine Monitor
◽
Untrusted Code
Download Full-text
Protection Tiers and Their Applications for Evaluating Untrusted Code on A Linux-Based Web Server
Journal of Communications
◽
10.12720/jcm.10.11.918-925
◽
2015
◽
Cited By ~ 1
Author(s):
Zhuhan Jiang
◽
◽
Jiansheng Huang
◽
Rezina Akhter
Keyword(s):
Web Server
◽
Untrusted Code
Download Full-text
A Survey of Virtualization Technologies Focusing on Untrusted Code Execution
2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing
◽
10.1109/imis.2012.92
◽
2012
◽
Cited By ~ 4
Author(s):
Yan Wen
◽
Jinjing Zhao
◽
Gang Zhao
◽
Hua Chen
◽
Dongxia Wang
Keyword(s):
Untrusted Code
Download Full-text
Research on proof-carrying code for untrusted-code security
Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)
◽
10.1109/secpri.1997.601335
◽
2002
◽
Cited By ~ 6
Author(s):
G. Necula
◽
P. Lee
Keyword(s):
Code Security
◽
Untrusted Code
Download Full-text
Making untrusted code useful
Communications of the ACM
◽
10.1145/2018396.2018418
◽
2011
◽
Vol 54
(11)
◽
pp. 92-92
Author(s):
Butler Lampson
Keyword(s):
Untrusted Code
Download Full-text
A Secure Virtual Execution Environment for Untrusted Code
Lecture Notes in Computer Science - Information Security and Cryptology - ICISC 2007
◽
10.1007/978-3-540-76788-6_13
◽
2007
◽
pp. 156-167
◽
Cited By ~ 8
Author(s):
Yan Wen
◽
Huaimin Wang
Keyword(s):
Virtual Execution
◽
Execution Environment
◽
Untrusted Code
Download Full-text
Safely Redistributing Untrusted Code using .NET
2006 IEEE Information Assurance Workshop
◽
10.1109/iaw.2006.1652113
◽
2006
◽
Author(s):
M.C. Carlisle
◽
J.W. Humphries
◽
J.A. Hamilton
Keyword(s):
Untrusted Code
Download Full-text
Secure composition of untrusted code: box π, wrappers, and causality types
Journal of Computer Security
◽
10.3233/jcs-2003-11202
◽
2003
◽
Vol 11
(2)
◽
pp. 135-187
◽
Cited By ~ 15
Author(s):
Peter Sewell
◽
Jan Vitek
Keyword(s):
Untrusted Code
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close