Efficient, Verifiable Binary Sandboxing for a CISC Architecture
Executing untrusted code while preserving security requiresenforcement of memory and control-flow safety policies:untrusted code must be prevented from modifying memory orexecuting code except as explicitly allowed. Software-basedfault isolation (SFI) or \"sandboxing\" enforces thosepolic...
Main Authors: | McCamant, Stephen, Morrisett, Greg |
---|---|
Other Authors: | Program Analysis |
Language: | en_US |
Published: |
2005
|
Online Access: | http://hdl.handle.net/1721.1/30542 |
Similar Items
-
A Machine-Checked Safety Proof for a CISC-Compatible SFI Technique
by: McCamant, Stephen
Published: (2006) -
Microprocessor architectures and systems : RISC, CISC, and DSP /
by: 217508 Heath, Steve
Published: (1993) -
Fungsi dan Makna Lagu This is CISC (CISC Anthem) Pada Komunitas Fans Sepakbola Chelsea Indonesia Supporters Club
by: Tri Danu Satria, et al.
Published: (2022-06-01) -
Quantitative information-flow tracking for real systems
by: McCamant, Stephen
Published: (2009) -
Predicting problems caused by component upgrades
by: McCamant, Stephen
Published: (2006)