Native client: A sandbox for portable, untrusted x86 native code

B Yee, D Sehr, G Dardyk, JB Chen, R Muth… - Communications of the …, 2010 - dl.acm.org
Native Client is a sandbox for untrusted x86 native code. It aims to give browser-based
applications the computational performance of native applications without compromising …

Leveraging legacy code to deploy desktop applications on the web.

JR Douceur, J Elson, J Howell, JR Lorch - OSDI, 2008 - usenix.org
Xax is a browser plugin model that enables developers to leverage existing tools, libraries,
and entire programs to deliver feature-rich applications on the web. Xax employs a novel …

[图书][B] Advanced programming in the UNIX environment

WR Stevens, SA Rago - 2013 - books.google.com
For more than twenty years, serious C programmers have relied on one book for practical, in-
depth knowledge of the programming interfaces that drive the UNIX and Linux kernels: W …

[PDF][PDF] Adapting Software Fault Isolation to Contemporary {CPU} Architectures

D Sehr, R Muth, C Biffle, V Khimenko, E Pasko… - 19th USENIX Security …, 2010 - usenix.org
Abstract Software Fault Isolation (SFI) is an effective approach to sandboxing binary code of
questionable provenance, an interesting use case for native plugins in a Web browser. We …

[PDF][PDF] SLIC: An Extensibility System for Commodity Operating Systems.

DP Ghormley, SH Rodrigues, D Petrou… - USENIX Annual …, 1998 - usenix.org
Modern commodity operating systems are large and complex systems developed over many
years by large teams of programmers, containing hundreds of thousands of lines of code …

Model-carrying code: a practical approach for safe execution of untrusted applications

R Sekar, VN Venkatakrishnan, S Basu… - ACM SIGOPS …, 2003 - dl.acm.org
This paper presents a new approach called model-carrying code (MCC) for safe execution
of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with …

Improving the reliability of commodity operating systems

MM Swift, BN Bershad, HM Levy - ACM Transactions on Computer …, 2005 - dl.acm.org
Despite decades of research in extensible operating system technology, extensions such as
device drivers remain a significant cause of system failures. In Windows XP, for example …

Securing untrusted code via compiler-agnostic binary rewriting

R Wartell, V Mohan, KW Hamlen, Z Lin - Proceedings of the 28th Annual …, 2012 - dl.acm.org
Binary code from untrusted sources remains one of the primary vehicles for malicious
software attacks. This paper presents Reins, a new, more general, and lighter-weight binary …

Protection and communication abstractions for web browsers in MashupOS

HJ Wang, X Fan, J Howell, C Jackson - ACM SIGOPS Operating …, 2007 - dl.acm.org
Web browsers have evolved from a single-principal platform on which one site is browsed at
a time into a multi-principal platform on which data and code from mutually distrusting sites …

A trusted open platform

P England, B Lampson, J Manferdelli, B Willman - Computer, 2003 - ieeexplore.ieee.org
A trusted open platform Page 1 0018-9162/03/$17.00 © 2003 IEEE July 2003 55 COVER
FEATURE Published by the IEEE Computer Society A Trusted Open Platform Computers are …