Citations
The paper
- Vassilis Prevelakis and
Diomidis Spinellis.
Sandboxing
applications.
In USENIX 2001 Technical Conference Proceedings: FreeNIX Track,
pages 119–126, Berkeley, CA, June 2001. USENIX Association.
has been cited by the following works.
- Kazuhiko Kato and
Yoshihiro Oyama.
Softwarepot:
An encapsulated transferable file system for secure software circulation.
In Software Security — Theories and Systems: Proceedings of the
International Symposium on Software Security, pages 112–132.
Springer-Verlag, November 2002.
Lecture Notes in Computer Science; Vol 2609.
- Sumit Kumar, Rajesh
Rajamani, and Abhishek Saxena.
Comminst:
Instrumenting process communication, 2002.
Available online http://www.cs.wisc.edu/ raj/comminst/comminstpaper.doc.
- Yoshihiro Oyama,
Katsunori Kanda, and Kazuhiko Kato.
Design and
implementation of secure software execution system SoftwarePot.
Computer Software, 19(6):2–12, November 2002.
In Japanese.
- W. Morein,
A. Stavrou, D. Cook, A. Keromytis, V. Misra, and D. Rubenstein.
Using graphic turing tests to counter automated DDoS attacks against web
servers.
In Proceedings of the 10th ACM International Conference on Computer and
Communications Security (CCS), pages 8–19, October 2003.
- Stelios
Sidiroglou and Angelos D. Keromytis.
Countering
network worms through automatic patch generation.
Technical Report CUCS-029-03, Computer Science Dept. University of Columbia,
2003.
- Stephen Boyd and
Angelos Keromytis.
SQLrand: Preventing SQL injection attacks.
In Markus Jakobsson, Moti Yung, and Jianying Zhou, editors, Applied
Cryptography and Network Security, Second International Conference, ACNS
2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, volume
3089 of Lecture Notes in Computer Science. Springer, 2004.
- Lap Chung Lam and
Tzi cker Chiueh.
Automatic extraction of
accurate application-specific sandboxing policy.
In International Symposium on Recent Advances in Intrusion Detection RAID
2004, pages 1–20. Eurécom Institute, Springer-Verlag, September
2004.
Lecture Notes in Computer Science 3224.
(doi:10.1007/b100714)
- Yves Younan, Wouter
Joosen, and Frank Piessens.
Code injection in C and C++ : A
survey of vulnerabilities and countermeasures.
Report CW 386, Katholieke Universiteit Leuven, Department of Computer Science,
Heberlee, Belgium, July 2004.
Available online http://fort-knox.org/CW386.pdf.
- G.S. Kc and A.D.
Keromytis.
e-NeXSh: Achieving an effectively non-executable stack and heap via
system-call policing.
In Proceedings — Annual Computer Security Applications Conference,
ACSAC, volume 2005, pages 286–300, 2005.
(doi:10.1109/CSAC.2005.22)
- L.-C. Lam and T.-C.
Chiueh.
Automatic extraction of accurate application-specific sandboxing policy.
In IEEE Military Communications Conference MILCOM, volume 2005,
2005.
(doi:10.1109/MILCOM.2005.1605766)
- Y. Oyama, K. Onoue, and
A. Yonezawa.
Speculative security checks in sandboxing systems.
In Proceedings - 19th IEEE International Parallel and Distributed
Processing Symposium, IPDPS 2005, volume 2005, pages 111–116, 2005.
(doi:10.1109/IPDPS.2005.408)
- Yves Younan, Wouter
Joosen, and Frank Piessens.
A methodology for
designing countermeasures against current and future code injection
attacks.
In Proceedings of the Third IEEE International Information Assurance
Workshop 2005 (IWIA2005). IEEE, March 2005.
- T. Khatiwala,
R. Swaminathan, and V.N. Venkatakrishnan.
Data sandboxing: A technique for enforcing confidentiality policies.
In ACSAC: Annual Computer Security Applications Conference, pages
223–232, 2006.
(doi:10.1109/ACSAC.2006.22)
- W. Li, L.-C. Lam, and T.-C.
Chiueh.
How to automatically and accurately sandbox Microsoft IIS.
In Proceedings - Annual Computer Security Applications Conference,
ACSAC, pages 213–222, 2006.
(doi:10.1109/ACSAC.2006.31)
- Helmut Salmen.
Method
and apparatus for restricted run-time environment with dynamic user
context.
United States Patent 7,069,275, June 2006.
Assignee: Sun Microsystems, Inc. (Santa Clara, CA).
- S. Sidiroglou and A.D. Keromytis.
Execution transactions for defending against software failures: Use and
evaluation.
International Journal of Information Security, 5(2):77–91, 2006.
(doi:10.1007/s10207-006-0083-6)
- B. Krishnamurthy,
D. Malandrino, and C.E. Wills.
Measuring privacy loss and the impact of privacy protection in web browsing.
In ACM International Conference Proceeding Series, volume 229,
pages 52–63, 2007.
(doi:10.1145/1280680.1280688)
- W. Li, L.-C. Lam, and T.-C.
Chiueh.
Accurate application-specific sandboxing for Win32/Intel binaries.
In IAS 2007: 3rd Internationl Symposium on Information Assurance and
Security, pages 375–380, 2007.
(doi:10.1109/IAS.2007.86)
- W. Sun, R. Sekar, Z. Liang,
and V.N. Venkatakrishnan.
Expanding malware defense by securing software installations.
In DIMVA 2008: 5th International Conference on Detection of Intrusions
and Malware, and Vulnerability Assessment, pages 164–185, July 2008.
Lecture Notes in Computer Science 5137.
(doi:10.1007/978-3-540-70542-0_9)
- Y. Wen and H.-M. Wang.
Isolated execution model based on local virtualization technology.
Jisuanji Xuebao/Chinese Journal of Computers, 31(10):1768–1779,
2008.
- Z. Liang, W. Sun, V.N.
Venkatakrishnan, and R. Sekar.
Alcatraz: An isolated environment for experimenting with untrusted software.
ACM Transactions on Information and System Security, 12(3), 2009.
(doi:10.1145/1455526.1455527)
- Salvatore J.
Stolfo, Angelos D. Keromytis, and Stelios Sidiroglou.
Methods,
media and systems for detecting anomalous program executions.
United States Patent 8,074,115, December 2011.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- Angelos D.
Keromytis and Salvatore J. Stolfo.
Methods,
media, and systems for detecting an anomalous sequence of function calls.
United States Patent 8,135,994, March 2012.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- Y. Younan, W. Joosen, and
F. Piessens.
Runtime countermeasures for code injection attacks against C and C++
programs.
ACM Computing Surveys, 44(3), 2012.
(doi:10.1145/2187671.2187679)
- Satya V. Gupta
and Prashant Shenoy.
System
and methods for run time detection and correction of memory corruption.
United States Patent 8,510,596, August 2013.
Assignee: Virsec Systems, Inc. (Acton, MA).
- Angelos D.
Keromytis and Salvatore J. Stolfo.
Methods,
media, and systems for detecting an anomalous sequence of function calls.
United States Patent 8,489,931, July 2013.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- Salvatore J.
Stolfo, Angelos D. Keromytis, and Stylianos Sidiroglou.
Methods,
media, and systems for detecting anomalous program executions.
United States Patent 8,601,322, December 2013.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- Gaurav S. Kc and
Alfred V. Aho.
Methods,
systems, and media for detecting and preventing malcode execution.
United States Patent 8,925,090, December 2014.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- Angelos D.
Keromytis and Salvatore J. Stolfo.
Methods,
media, and systems for detecting an anomalous sequence of function calls.
United States Patent 8,694,833, April 2014.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- J. Liu, S.Y. Chen, M.W.
Lin, and H. Liu.
A reliable file protection system based on transparent encryption.
International Journal of Security and its Applications,
8(1):123–132, 2014.
(doi:10.14257/ijsia.2014.8.1.12)
- C. Borrego,
S. Robles, A. Fabregues, and A. Sánchez-Carmona.
A mobile code bundle extension for application-defined routing in delay and
disruption tolerant networking.
Computer Networks, 87:59–77, 2015.
(doi:10.1016/j.comnet.2015.05.017)
- Satya V. Gupta
and Prashant Shenoy.
System
and methods for run time detection and correction of memory corruption.
United States Patent 8,966,312, February 2015.
Assignee: Virsec Systems, Inc. (Acton, MA).
- P. Priller,
W. Gruber, N. Olberding, and D. Peinsipp.
Towards perfectly scalable real-time systems.
International Conference on Computer Safety, Reliability, and Securitym,
SAFECOMP 2015 and held 3rd International Workshop on Assurance Cases for
Software-Intensive Systems ASSURE 2015, Workshop on Dependable Embedded and
Cyber-Physical Systems and Systems-of-Systems, DECSoS 2015, 2nd International
Workshop on the Integration of Safety and Security Engineering, ISSE 2015,
Workshop on Reliability and Security Aspects for Critical Infrastructure
Protection, ReSA4CI 2015, and 4th InternationalWorkshop on NextGeneration of
System Assurance Approaches for Safety-Critical Systems SASSUR, 2015,
9338:212–223, 2015.
(doi:10.1007/978-3-319-24249-1_19)
- C. Sanders, A. Shah,
and S. Zhang.
Comprehensive analysis of the Android google play's auto-update policy.
11th International Conference on Information Security Practice and
Experience, ISPEC 2015, 9065:365–377, 2015.
(doi:10.1007/978-3-319-17533-1_25)
- Stylianos
Sidiroglou, Angelos D. Keromytis, and Salvatore J. Stolfo.
Systems,
methods, and media protecting a digital data processing device from
attack.
United States Patent 9,143,518, September 2015.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- Angelos D.
Keromytis and Salvatore J. Stolfo.
Methods,
media, and systems for detecting an anomalous sequence of function calls.
United States Patent 9,450,979, September 2016.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- Ronald Mraz and
James Hope.
Enterprise
cross-domain solution having configurable data filters.
United States Patent 9,380,023, June 2016.
Assignee: Owl Computing Technologies, Inc. (Ridgefield, CT).
- Michalis Polychronakis and Angelos Keromytis.
Detecting
return-oriented programming payloads by evaluating data for a gadget address
space address and determining whether operations associated with instructions
beginning at the address indicate a return-oriented programming payload.
United States Patent 9,495,541, November 2016.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
- J. Zhao, G. Shi, and
D. Meng.
A survey on the studies of security guard technology for process.
Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of
Technology, 48(5):77–84, 2016.
(doi:10.11918/j.issn.0367-6234.2016.05.012)
- Stylianos
Sidiroglou, Angelos D. Keromytis, and Salvatore J. Stolfo.
Systems,
methods, and media protecting a digital data processing device from
attack.
United States Patent 9,544,322, January 2017.
Assignee: The Trustees of Columbia University in the City of New York (New
York, NY).
Home
Unless otherwise expressly stated, all original material on this page created by Diomidis Spinellis is licensed under a Creative Commons Attribution-Share Alike 3.0 Greece License.