Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems]
DOI: 10.1109/fits.2003.1264946
|View full text |Cite
|
Sign up to set email alerts
|

Hardening COTS software with generic software wrappers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
42
0

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 34 publications
(42 citation statements)
references
References 18 publications
0
42
0
Order By: Relevance
“…Analogously, in [7] wrappers are used, among other things, to transparently encrypt local files accessed by library calls. However, distributed environments are not taken into account.…”
Section: Related Workmentioning
confidence: 99%
“…Analogously, in [7] wrappers are used, among other things, to transparently encrypt local files accessed by library calls. However, distributed environments are not taken into account.…”
Section: Related Workmentioning
confidence: 99%
“…As an alternative to modifying the involved components an attractive alternative is to add new components "wrapping" the original component [Fraser et al, 1999;Ghosh et al, 1999;Mitchem et al, 2000]. Such wrappers can be added where needed and thus be applied on a policy basis or where likely to be most effective [Hiller et al, 2002a].…”
Section: Robustness Enhancing Wrappersmentioning
confidence: 99%
“…To accomplish this, they rely on ptrace (2), the /proc file system, and/or special shared libraries. Another category of systems, such as Tron [9], SubDomain [12] and others [18,20,36,30,37,28,32], go a step further. They intercept system calls inside the kernel, and use policy engines to decide whether to permit the call or not.…”
Section: Related Workmentioning
confidence: 99%