Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Frank Capobianco"'
Publikováno v:
CSF
Authorization hooks are access control checks that prevent unauthorized principals from interacting with some protected resource, and are used extensively in critical software such as operating systems, middleware, and server programs. They are often
Autor:
Yongzhe Huang, Frank Capobianco, Trent Jaeger, Shen Liu, Stephen McCamant, Gang Tan, Dongrui Zeng
Publikováno v:
CCS
Privilege separation is an effective technique to improve software security. However, past partitioning systems do not allow programmers to make quantitative tradeoffs between security and performance. In this paper, we describe our toolchain called
Autor:
Frank Capobianco, Paul Yu, Zhiyun Qian, Kaiming Huang, Rahul George, Srikanth V. Krishnamurthy, Mathias Payer, Trent Jaeger
Publikováno v:
NSPW
Intrusion detection systems are a commonly deployed defense that examines network traffic, host operations, or both to detect attacks. However, more attacks bypass IDS defenses each year, and with the sophistication of attacks increasing as well, we
Publikováno v:
SACMAT
While we have long had principles describing how access control enforcement should be implemented, such as the reference monitor concept, imprecision in access control mechanisms and access control policies leads to risks that may enable exploitation
Autor:
Adam Bates, Patrick T. Cable, Frank Capobianco, Trent Jaeger, Thomas Moyer, Nabil Schear, Kevin R. B. Butler, Karishma Chadha, Warren Smith, Robert K. Cunningham
Publikováno v:
SecDev
Building secure systems used to mean ensuring a secure perimeter, but that is no longer the case. Today's systems are ill-equipped to deal with attackers that are able to pierce perimeter defenses. Data provenance is a critical technology in building
Publikováno v:
SecDev
We examine the problem of maintaining security code across program versions. There are now several cases where programmers manually retrofit their programs with security code, such as authorization mechanisms. However, programs evolve, so a challenge