Sandbox

Results: 445



#Item
201Security / EMC Corporation / RSA / Imperva / Malware / Vulnerability / Computer security / Computer network security / Cyberwarfare

CALL FOR ENTRIES: RSA® CONFERENCE 2010 INNOVATION SANDBOX

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-03-24 10:40:45
202System software / Buffer overflow / SIGSEGV / Sandbox / Anomaly detection / Segmentation fault / Computing / Software bugs / Computer errors

End-Point Counter-Worm Mechanism Using Automated Software Patching Angelos Keromytis Columbia University

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2003-10-09 02:05:17
203Computer network security / Public-key cryptography / Sandbox / Crime prevention / National security / Computer security / Internet / Trust / Operating system / Ethics / Security / Software

Government role in Trust Government has a pivotal role in establishing the level of trust that society needs in many areas. We trust banks and hospitals, without having to rely on anecdotal endorsement from others, becau

Add to Reading List

Source URL: gov2.net.au

Language: English - Date: 2014-05-22 00:52:12
204Libvirt / Cgroups / Sandbox / QEMU / LXC / Xen / SeaBIOS / Libguestfs / System software / Software / Virtual machines

KVM Forum 2012: libvirt-sandbox Building application sandboxes on top of KVM or LXC with libvirt Daniel P. Berrangé <>  

Add to Reading List

Source URL: www.linux-kvm.org

Language: English - Date: 2013-04-01 15:46:56
205Computing / Sandbox / Force.com / Salesforce.com / Development environment / Revision control / Continuous integration / Software development / Software / Software development process

Development Lifecycle Guide

Add to Reading List

Source URL: www.salesforce.com

Language: English - Date: 2015-04-24 11:58:44
206Java applet / Java platform / Java programming language / Mandatory access control / Sandbox / JavaScript / Asbestos / Computing / System software / Software

Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TRAugust 6, 2007

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2008-11-10 16:49:33
207Virtual machines / Dynamic-link library / Computer virus / Hypervisor / Sandbox / Malware / Library / Full virtualization / VirtualBox / System software / Software / VMware

Breaking the Sandbox Author: Sudeep Singh Introduction In this paper, I would like to discuss various existing and interesting techniques which are used to evade the detection of a virus in Sandbox. We will also look at

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2014-09-09 07:50:36
208Portable software / Web browsers / Plug-in / Sandbox / NPAPI / NSPluginWrapper / Software / Application programming interfaces / Google Chrome

How
I
Learned
to
Stop
Worrying
 and
Love
Plugins
 Chris
Grier,
Samuel
T.
King,
Dan
S.
Wallach
 UIUC,
Rice
University
 Browser
Plugins


Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:05
209Software testing / Malware / Computer network security / Sandbox / Computer virus / Computer security / Polymorphic code / System software / Software / Antivirus software

White Paper Build a Better Sandbox. Create a working strategy for comprehensive malware protection.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-10-01 13:49:51
210Computer memory / Central processing unit / CPU cache / Virtual memory / Computer architecture / Timing attack / Memory management unit / JavaScript / Cache algorithms / Cache / Computing / Computer hardware

The Spy in the Sandbox – Practical Cache Attacks in Javascript arXiv:1502.07373v2 [cs.CR] 1 Mar 2015 Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan and Angelos D. Keromytis Computer Science Department, Columb

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2015-03-02 21:40:58
UPDATE