نتایج جستجو برای: sandbox model

تعداد نتایج: 2104952  

Journal: :JCP 2009
Jimin Li Zhen Li Kunlun Li

Based on the immune mechanism, we present a computer system security model used to detect and classify non-self, which overcomes some drawbacks of traditional computer immune system based on system call: the large number of system calls intercepted, the loss of useful information owing to paying no attention to the arguments of system calls, distinction between self and non-self just by rule ma...

2016
Tyler Hunt Zhiting Zhu Yuanzhong Xu Simon Peter Emmett Witchel

Users of modern data-processing services such as tax preparation or genomic screening are forced to trust them with data that the users wish to keep secret. Ryoan protects secret data while it is processed by services that the data owner does not trust. Accomplishing this goal in a distributed setting is difficult because the user has no control over the service providers or the computational p...

2005
Sriya Santhanam Pradheep Elango Andrea C. Arpaci-Dusseau Miron Livny

The ability to securely run arbitrary untrusted code on a wide variety of execution platforms is a challenging problem in the Grid community. One way to achieve this is to run the code inside a contained, isolated environment, namely a “sandbox”. Virtual machines provide a natural solution to the security and resource management issues that arise in sandboxing. We explore different designs for ...

Journal: :Eastern-European Journal of Enterprise Technologies 2021

This paper reports a method of protection against zero-day attacks using SandBox technology based on the developed analytical model with probabilistic ranking information system states. The takes into consideration conditions priori uncertainty regarding parameters destructive flow system, accounting for typical procedures network SandBox. proposed states makes it possible to analyze and track ...

2003
Koichi Onoue Tomoyuki Nishita

Interactive applications such as virtual reality systems have become popular in recent years. A ground surface composed of a granular material can be deformed when it comes into contact with an object, and, in this paper, we propose a deformation algorithm for the ground surface which is useful for such applications. The deformation algorithm is divided into three steps: (1) detection of the co...

Journal: :JIP 2011
Katsunari Yoshioka Yoshihiko Hosobuchi Tatsunori Orii Tsutomu Matsumoto

The use of public Malware Sandbox Analysis Systems (public MSASs) which receive online submissions of possibly malicious files or URLs from an arbitrary user, analyze their behavior by executing or visiting them by a testing environment (i.e., a sandbox), and send analysis reports back to the user, has increased in popularity. Consequently, anti-analysis techniques have also evolved from known ...

2010
Robert N. M. Watson Jonathan Anderson Ben Laurie Kris Kennaway

Capsicum is a lightweight operating system capability and sandbox framework planned for inclusion in FreeBSD 9. Capsicum extends, rather than replaces, UNIX APIs, providing new kernel primitives (sandboxed capability mode and capabilities) and a userspace sandbox API. These tools support the compartmentalization of monolithic UNIX applications into logical applications. We demonstrate our appro...

Journal: :Hyperrhiz: New Media Cultures 2015

2017

A malware is a program that has a malicious intent. Nowadays, attack from malwares is rising in alarming fashion and thousands of malwares are injected to the Internet. Malware authors use many techniques like obfuscation and packing to avoid detection. A number of techniques for malware detection are available and none of them able to detect all types of malwares. In this paper, a more efficie...

2006
Rasmus Andersen Brian Vinter

­ In this paper we demonstrate how to efficiently exploit the massive amount of idle CPU cycles from workstations and desktop PCs for Grid computing. The cycle harvesting is achieved by using sandbox technology and a generic guest operating system, specifically designed for the Grid resource. This relieves the resource owner from the complexity of installing and managing not only the resource s...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید