Secure code execution system operation algorithm
نویسندگان
چکیده
منابع مشابه
Secure Execution of Student Code
To grade projects in a large computer science course requires verifying the correctness of a great many student programs, all against identical inputs and outputs. This situation is an obvious candidate for automation, and calls for a system to which students can remotely upload their project implementations, and which will automatically check those implementations against tests uploaded previo...
متن کاملSecure Execution of Untrusted Code
We introduce CS50 Sandbox, an environment for secure execution of untrusted code. Implemented as an asynchronous HTTP server, CS50 Sandbox offers clients the ability to execute programs (both interactive and non-interactive) written in any compiled or interpreted language in a tightly controlled, resource-constrained environment. CS50 Sandbox’s HTTP-based API takes files, command lines, and sta...
متن کاملSecure Mobile Code Execution Service
Mobile code refers to programs that come into a host computer over the network and start to execute with or without a user’s knowledge or consent. Because these programs run in the execution context of the user that downloads them, they can issue any system calls that the user is allowed to make, and thus pose a serious security threat when they are malicious. Although many solutions have been ...
متن کاملMATLAB CODE FOR VIBRATING PARTICLES SYSTEM ALGORITHM
In this paper, MATLAB code for a recently developed meta-heuristic methodology, the vibrating particles system (VPS) algorithm, is presented. The VPS is a population-based algorithm which simulates a free vibration of single degree of freedom systems with viscous damping. The particles gradually approach to their equilibrium positions that are achieved from current population and historically b...
متن کامل2 Providing Secure Code Execution on General-purpose Systems
I envision a future in which average computer users can easily and securely use their computers to perform sensitive tasks (e.g., paying bills, shopping online, or accessing medical records), while still retaining the flexibility and performance they have come to expect. Users will regard a computer attack not as a disaster that empties bank accounts or destroys documents, but as a minor annoya...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the Institute for System Programming of the RAS
سال: 2017
ISSN: 2079-8156,2220-6426
DOI: 10.15514/ispras-2017-29(3)-2