Extensibility is a vital property of modern applications. An extension component is downloaded from Internet and loaded into an application. However, an extension component may be malicious. Thus there is a risk of the application being illegally accessed. To protect the application from mali-cious components, this paper proposes a multi-protection page table: a mechanism for providing pro-tection among an application and components residing in the same address space. A multi-protection page table provides kernel-level fine-grained protection domains, thereby enabling efficient cross-domain calls between fine-grained protection domains. To prove that a multi-protection page table can be implemented on stock hardware, the paper shows the imp...
Safe language technology can be used for protection within a single address space. This protection i...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
This paper describes a mechanism for protecting against malicious mobile code. As mobile code is lin...
With reference to a classical address translation scheme supporting the notion of a paged virtual a...
The technological evolution towards extensible software architectures and component-based software d...
The technological evolution towards extensible software systems and component-based software develop...
Extensible systems allow services to be configured and deployed for the specific needs of individual...
We consider a single-address-space system which implements a form of segmentation with paging within...
Protecting modern computer systems and complex software stacks against the growing range of possible...
Protecting modern computer systems and complex software stacks against the growing range of possible...
International audienceEmbedded systems are parts of our daily life and used in many fields. They can...
Scalable distributed systems, systems whose processing power remains proportional to the number of c...
Multicore architectures, with their abundant on-chip resources, are effectively collections of syste...
We present a novel technique to secure the execu-tion of a processor against the execution of malici...
Safe language technology can be used for protection within a single address space. This protection i...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...
This paper describes a mechanism for protecting against malicious mobile code. As mobile code is lin...
With reference to a classical address translation scheme supporting the notion of a paged virtual a...
The technological evolution towards extensible software architectures and component-based software d...
The technological evolution towards extensible software systems and component-based software develop...
Extensible systems allow services to be configured and deployed for the specific needs of individual...
We consider a single-address-space system which implements a form of segmentation with paging within...
Protecting modern computer systems and complex software stacks against the growing range of possible...
Protecting modern computer systems and complex software stacks against the growing range of possible...
International audienceEmbedded systems are parts of our daily life and used in many fields. They can...
Scalable distributed systems, systems whose processing power remains proportional to the number of c...
Multicore architectures, with their abundant on-chip resources, are effectively collections of syste...
We present a novel technique to secure the execu-tion of a processor against the execution of malici...
Safe language technology can be used for protection within a single address space. This protection i...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
Software vulnerabilities widely exist among various software from operating system kernel to web bro...