Polaris: virus-safe computing for Windows XP

@article{Stiegler2006PolarisVC,
  title={Polaris: virus-safe computing for Windows XP},
  author={M. Stiegler and A. Karp and K. Yee and T. Close and Mark S. Miller},
  journal={Commun. ACM},
  year={2006},
  volume={49},
  pages={83-88}
}
It limits the damage a virus can do by using the operating system's own security mechanisms to enforce the Principle of Least Authority on individual applications. 
Make Least Privilege a Right (Not a Privilege)
TLDR
This work investigates why modern OSes thwart secure programming practices and proposes solutions that would help improve system security. Expand
Bitfrost: the one laptop per child security model
TLDR
An integrated security model for a low-cost laptop that will be widely deployed throughout the developing world is presented, designed to restrict the laptop's software without restricting theaptop's user. Expand
The One Laptop per Child Security Model
TLDR
An integrated security model for a low-cost laptop that will be widely deployed throughout the developing world is presented, designed to restrict the laptop's software without restricting the laptop’s user. Expand
Usable Security Policies for Runtime Environments
TLDR
The runtime environments provided by application-level virtual machines such as the Java Virtual Machine or the .NET Common Language Runtime are attractive for Internet application providers because of their ease of integration and extensibility. Expand
An attack-resistant and rapid recovery desktop system
General-purpose computing devices, such as personal computers (PCs), and the operating systems that run on them provide more functionality and capabilities than most users will ever want or need. TooExpand
Security and Privacy for Untrusted Applications in Modern and Emerging Client Platforms
TLDR
Security and Privacy from Untrusted Applications in Modern and Emerging Client Platforms shows how trust and privacy in these applications has changed over the past decade and how these applications have changed the way people interact with one another. Expand
Guidelines and Strategies for Secure Interaction Design
TLDR
To give a sense of how important it is to look beyond authentication, consider some of today’s most serious security problems, which would be better described as failures of computers to behave as their users expect. Expand
Server Hardening Model Development: A Methodology-Based Approach to Increased System Security
TLDR
This chapter builds a complete model which includes advice on tools, tactics, and techniques that system administrators can use to harden a server against compromise and attack. Expand
Securing the use of sensitive data on remote devices using a hardware-software architecture
TLDR
The Authority-mode Secret-Protection Architecture, which places roots of trust in hardware in the processor chip, is designed, implemented, and tested and a testing framework is built that can help designers validate new security architectures like this one is built. Expand
Unified Protection Model of Application Files and User Files
Computer file is the main target of computer viruses. In order to protect the user files, User's intentions is introduced in this paper, its main idea is that whether meet the user's intentions isExpand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 31 REFERENCES
Paradigm Regained: Abstraction Mechanisms for Access Control
Access control systems must be evaluated in part on how well they enable one to distribute the access rights needed for cooperation, while simultaneously limiting the propagation of rights whichExpand
Building Systems to Be Shared, Securely
TLDR
The history of computing has been characterized by continuous transformation resulting from the dramatic increases in performance and drops in price described by Moore’s law, and system sharing remains an important tool for computing. Expand
The internet worm program: an analysis
TLDR
The paper contains a review of the security flaws exploited by the worm program, and gives some recommendations on how to eliminate or mitigate their future use. Expand
Shatter-proofing Windows
TLDR
This paper presents a means of defeating this entire family of attacks with minimal breaking of applications and effect on the look and feel of the user interface. Expand
User Interaction Design for Secure Systems
  • K. Yee
  • Computer Science
  • ICICS
  • 2002
TLDR
Ten principles for secure interaction design are identified and the concept of the subjective actor-ability state is introduced, to model systems in terms of actors and actions. Expand
The protection of information in computer systems
TLDR
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification by examining in depth the principles of modern protection architectures and the relation between capability systems and access control list systems. Expand
Securing Java: getting down to business with mobile code
TLDR
This book discusses the development and use of Java security guidelines, as well as some of the challenges faced by Java developers in the rapidly changing world of mobile code. Expand
An introduction to petname systems
  • Advances in Financial Cryptography,
  • 2005
Cyber Extortion Attack
  • Cyber Extortion Attack
  • 2005
Developer Best Practices and Guidelines for Applications in a Least Privileged Environment: Understanding User Account Protection in Microsoft Windows Vista Beta 1, Windows Security Access Control
  • 2005
...
1
2
3
4
...