Many software applications extend their functionality by dynamically loading libraries into their allocated address space. However, shared libraries are also often of unknown provenance and quality and may contain accidental bugs or, in some cases, deliberately malicious code. Most sandboxing techniques which address these issues require recompilation of the libraries using custom tool chains, require significant modifications to the libraries, do not retain the benefits of single address-space programming, do not completely isolate guest code, or incur substantial performance overheads. In this paper we present LibVM, a sandboxing architecture for isolating libraries within a host application without requiring any modifications to the shar...
t is often useful for a code component (e.g., a library) to be able to maintain information that is ...
Extensible applications rely upon user-supplied, untrusted modules to extend their func-tionality. T...
As applications executing in virtual machine runtime environments such as the Java Virtual Machine a...
Many software applications extend their functionality by dynamically loading libraries into their al...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
Abstract—Network has been widely applied in all aspects of life with time. Spread of malicious progr...
Extensible systems allow services to be configured and deployed for the specific needs of individual...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
The applications we use today are developed as a combination of first-party code and code borrowed f...
Part 6: Software SecurityInternational audienceDynamically-linked libraries are widely adopted in ap...
Flaws in the standard libraries of secure sandboxes represent a major security threat to billions of...
<p>It is more expensive and time consuming to build modern software without extensive supply chains....
Software libraries can freely access the program's entire address space, and also inherit its system...
Abstract. The number of applications that are downloaded from the Internet and executed on-the-fly i...
t is often useful for a code component (e.g., a library) to be able to maintain information that is ...
Extensible applications rely upon user-supplied, untrusted modules to extend their func-tionality. T...
As applications executing in virtual machine runtime environments such as the Java Virtual Machine a...
Many software applications extend their functionality by dynamically loading libraries into their al...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
Abstract—Network has been widely applied in all aspects of life with time. Spread of malicious progr...
Extensible systems allow services to be configured and deployed for the specific needs of individual...
This paper focuses on an efficient user-level method for the deployment of application-specific exte...
The applications we use today are developed as a combination of first-party code and code borrowed f...
Part 6: Software SecurityInternational audienceDynamically-linked libraries are widely adopted in ap...
Flaws in the standard libraries of secure sandboxes represent a major security threat to billions of...
<p>It is more expensive and time consuming to build modern software without extensive supply chains....
Software libraries can freely access the program's entire address space, and also inherit its system...
Abstract. The number of applications that are downloaded from the Internet and executed on-the-fly i...
t is often useful for a code component (e.g., a library) to be able to maintain information that is ...
Extensible applications rely upon user-supplied, untrusted modules to extend their func-tionality. T...
As applications executing in virtual machine runtime environments such as the Java Virtual Machine a...