نتایج جستجو برای: sandbox model
تعداد نتایج: 2104952 فیلتر نتایج به سال:
A software tool allowing the safe monitoring of the execution of malicious software (malware), or more generally, programs that cannot be trusted is commonly referred to as a sandbox. Most of the time, a sandbox is implemented in a virtual machine or a simulated operating system and allows the behaviour of the program to be studied from the host's point of view. We are investigating the usefuln...
Quest-V is a system we have been developing from the ground up, with objectives focusing on safety, predictability and efficiency. It is designed to work on emerging multicore processors with hardware virtualization support. Quest-V is implemented as a “distributed system on a chip” and comprises multiple sandbox kernels. Sandbox kernels are isolated from one another in separate regions of phys...
In this paper we describe a new interface to scientific databases, the SANDBOX: Scientists Accessing Necessary Data Based On eXperimentation. The SANDBOX is a virtual reality tool allowing an investigator to visualize the contents of a scientific database while retrieving data. As the data in these databases was typically collected through experimentation, an investigator can use the SANDBOX to...
Sandbox and Proactive Signature Detection But sandboxing is resource-intensive. Code needs to fully execute in the sandbox before it can be analyzed, and exploring all code execution paths — possibly including additional modules that malicious code tries to download — takes time. Fortinet combines sandboxing with proactive signature detection to filter traffic before it hits the sandbox, since ...
SGs represent a great potential for education since they can join an instructional value with the appealing language of digital natives. Searching for methodologies to support effective authoring of Serious Games (SGs), we have abstracted a model consisting of a 3D geo-referenced Virtual World (VW) where knowledge is implemented also through tasks that are disseminated across the environment. T...
Quest-V is a system we have been developing from the ground up, with objectives focusing on safety, predictability and efficiency. It is designed to work on emerging multicore processors with hardware virtualization support. Quest-V is implemented as a “distributed system on a chip” and comprises multiple sandbox kernels. Sandbox kernels are isolated from one another in separate regions of phys...
It is more expensive and time consuming to build modern software without extensive supply chains. Supply chains decrease these development risks, but typically at the cost of increased security risk. In particular, it is often difficult to understand or verify what a software component delivered by a third party does or could do. Such a component could contain unwanted behaviors, vulnerabilitie...
Sandboxes are increasingly important building materials for secure software systems. In recognition of their potential to improve the security posture of many systems at various points in the development lifecycle, researchers have spent the last several decades developing, improving, and evaluating sandboxing techniques. What has been done in this space? Where are the barriers to advancement? ...
The application of dynamic malware analysis in order to automate the monitoring of malware behavior has become increasingly important. For this purpose, so-called sandboxes are used. They provide the functionality to execute malware in a secure, controlled environment and observe its activities during runtime. While a variety of sandbox software, such as the GFI Sandbox (formerly CWSandbox) or ...
Research aimed at securing the SCADA and ICS networks has taken off in the wake of Stuxnet. Unfortunately, it is difficult for researchers to fully capture the integration between cyber and physical components that is intrinsic to these systems. To enable researchers to perform network security experiments while taking into account the physical component of ICS networks, we propose the use of t...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید