It has become extremely difficult to distinguish a benign application from a malicious one as the number of untrusted applications on the Internet increases rapidly every year. In this project, we develop a lightweight application confinement mechanism for Linux systems in order to aid most users to increase their confidence in various applications that they stumble upon and use on a daily basis. Developed sandboxing facility monitors a targeted application’s activity and imposes restrictions on its access to operating system resources during its execution. Using a simple but expressive policy language, users are able to create security policies. During the course of the traced application’s execution, sandboxing facility makes execution de...
The increasing availability of cloud computing and scientific super computers brings great potential...
Analysis of Linux binaries for indicators of compromise is an area of research gaining in interest d...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
It has become extremely difficult to distinguish a benign application from a malicious one as the n...
Sandboxing systems are extremely useful for secure execution of untrusted applications. Many of the ...
It is more expensive and time consuming to build modern software without extensive supply chains. Su...
Abstract—Network has been widely applied in all aspects of life with time. Spread of malicious progr...
Abstract — Comparing the system call sequence of a network application against a sandboxing policy i...
Software systems are vulnerable to attack in many different ways. Systems can be poorly implemented ...
Abstract. One of the most dangerous cybersecurity threats is control hijacking attacks, which hijack...
In this paper, we introduce sandboxer, an application isolation mechanism for Moblin based Mobile In...
Comparing the system call sequence of a network application against a sandboxing policy is a popular...
The principle of least privilege states that components in a system should only be allowed to perfor...
Sandbox applications can be used as anti-forensics techniques to hide important evidence in the digi...
The steadily increasing amount of malware puts an even larger amount of work required to analyze all...
The increasing availability of cloud computing and scientific super computers brings great potential...
Analysis of Linux binaries for indicators of compromise is an area of research gaining in interest d...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...
It has become extremely difficult to distinguish a benign application from a malicious one as the n...
Sandboxing systems are extremely useful for secure execution of untrusted applications. Many of the ...
It is more expensive and time consuming to build modern software without extensive supply chains. Su...
Abstract—Network has been widely applied in all aspects of life with time. Spread of malicious progr...
Abstract — Comparing the system call sequence of a network application against a sandboxing policy i...
Software systems are vulnerable to attack in many different ways. Systems can be poorly implemented ...
Abstract. One of the most dangerous cybersecurity threats is control hijacking attacks, which hijack...
In this paper, we introduce sandboxer, an application isolation mechanism for Moblin based Mobile In...
Comparing the system call sequence of a network application against a sandboxing policy is a popular...
The principle of least privilege states that components in a system should only be allowed to perfor...
Sandbox applications can be used as anti-forensics techniques to hide important evidence in the digi...
The steadily increasing amount of malware puts an even larger amount of work required to analyze all...
The increasing availability of cloud computing and scientific super computers brings great potential...
Analysis of Linux binaries for indicators of compromise is an area of research gaining in interest d...
Consumer devices are increasingly being used to perform security and privacy critical tasks. The sof...