[PDF][PDF] A survey on virtualization technologies

SNT Chiueh, S Brook - Rpe Report, 2005 - 132.248.181.216
Virtualization is a technology that combines or divides computing resources to present one
or many operating environments using methodologies like hardware and software …

Methods and systems for launching applications into existing isolation environments

M Chinta, SA Raj - US Patent 8,090,797, 2012 - Google Patents
(54) METHODS AND SYSTEMS FOR LAUNCHING 2 gen)'et,, ast et a. APPLICATIONS INTO
EXISTING ISOLATION 5,341,478 A 8/1994 Travis et a1 'ENVIRONMENTS 5,384,911 A …

[BOG][B] Forensic discovery

D Farmer, W Venema - 2004 - dl.acm.org
Forensic Discovery | Guide books skip to main content ACM Digital Library home ACM
Association for Computing Machinery corporate logo Google, Inc. (search) Advanced Search …

Blade: an attack-agnostic approach for preventing drive-by malware infections

L Lu, V Yegneswaran, P Porras, W Lee - … of the 17th ACM conference on …, 2010 - dl.acm.org
Web-based surreptitious malware infections (ie, drive-by downloads) have become the
primary method used to deliver malicious software onto computers across the Internet. To …

[PDF][PDF] {AdJail}: Practical Enforcement of Confidentiality and Integrity Policies on Web Advertisements

M Ter Louw, KT Ganesh… - 19th USENIX Security …, 2010 - usenix.org
Web publishers frequently integrate third-party advertisements into web pages that also
contain sensitive publisher data and end-user personal data. This practice exposes …

A general dynamic information flow tracking framework for security applications

LC Lam, T Chiueh - 2006 22nd Annual Computer Security …, 2006 - ieeexplore.ieee.org
Many software security solutions require accurate tracking of control/data dependencies
among information objects in network applications. This paper presents a general dynamic …

The state of the art of application restrictions and sandboxes: A survey of application-oriented access controls and their shortfalls

ZC Schreuders, T McGill, C Payne - Computers & Security, 2013 - Elsevier
Under most widely-used security mechanisms the programs users run possess more
authority than is strictly necessary, with each process typically capable of utilising all of the …

Method and apparatus for isolating execution of software applications

LG Laborczfalvi, A Roychoudhry, AG Borzycki… - US Patent …, 2010 - Google Patents
Prior Publication Data() Us 2006/0075381 A1 Apr '6'2006 A method for isolating access by
application programs to native resources provided by an operating system redirects a 51 …

Method and a system for responding locally to requests for file metadata associated with files stored remotely

JH Nord, DR Hoy - US Patent 8,131,825, 2012 - Google Patents
(57) ABSTRACT A method and system for responding locally to requests for file metadata
associated with files stored remotely includes a method of responding locally to requests for …

Method and system for accessing a remote file in a directory structure associated with an application program executing locally

BJ Pedersen, JH Nord, DR Hoy - US Patent 7,779,034, 2010 - Google Patents
(54) METHOD AND SYSTEM FOR ACCESSINGA 5,321,841 A 6/1994 East et a1. REMOTE
FILE IN A DIRECTORY 5,341,478 A 8/1994 Travis, Jr. et a1. STRUCTURE ASSOCIATED …