×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [untrusted application]
Home >
untrusted application
Security for io t apr 29th mentor embedded hangout
479 views
Fav
1.461 views
ADAPTIVE PARTITION SCHEDULER
352 views
APPLIEDRESEARCH PPT.pptx
232 views
Securing Untrusted Code via Compiler-Agnostic Binary Rewriting Richard Wartell, Vishwath Mohan, Dr. Kevin Hamlen, Dr. Zhiqiang Lin The University of Texas.
214 views
Running Untrusted Application Code: Sandboxing. Running untrusted code We often need to run buggy/unstrusted code: programs from untrusted Internet sites:
243 views
Poly stop a hacker David Walker Princeton University (joint work with Lujo Bauer and Jay Ligatti)
219 views
A SECURE JAILING SYSTEM FOR CONFINING UNTRUSTED APPLICATIONS
24 views
Running Untrusted Application Code: Sandboxing
41 views
08/03/071/41 Polymer: A Language and System for Specifying Complex, Modular Run-time Policies Jay Ligatti, University of South Florida Joint work with:
213 views
A SECURE JAILING SYSTEM FOR CONFINING UNTRUSTED APPLICATIONS
46 views
CT
159 views
Next >