Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-76929-3_28
|View full text |Cite
|
Sign up to set email alerts
|

A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…Sandboxing can be used to improve security of file access [10], analyze malicious codes [11], make sure the data written with no sensitive information [12], etc. Many studies have improved the traditional sandbox toward dissimilar emphases: sandbox executing speculative security checks [13], sandbox with a dynamic policy [14], dynamic sandbox quarantining untrusted entities [15], etc.…”
Section: B Sandboxmentioning
confidence: 99%
“…Sandboxing can be used to improve security of file access [10], analyze malicious codes [11], make sure the data written with no sensitive information [12], etc. Many studies have improved the traditional sandbox toward dissimilar emphases: sandbox executing speculative security checks [13], sandbox with a dynamic policy [14], dynamic sandbox quarantining untrusted entities [15], etc.…”
Section: B Sandboxmentioning
confidence: 99%