Sandbox (computer security)

Known as: Software fault isolation, Sandboxed, Sandbox 
In computer security, a sandbox is a security mechanism for separating running programs. It is often used to execute untested or untrusted programs… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1992-2017
05019922017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
The increasing popularity of Google’s mobile platform Android makes it the prime target of the latest surge in mobile malware… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2011
2011
Robust, static disassembly is an important part of achieving high coverage for many binary code analyses, such as reverse… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Smartphones are steadily gaining popularity, creating new application areas as their capabilities increase in terms of… (More)
  • figure 2
  • figure 3
  • figure 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Android is a modern and popular software platform for smartphones. Among its predominant features is an advanced security model… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Review
2009
Review
2009
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Most current web browsers employ a monolithic architecture that combines “the user” and “the web” into a single protection domain… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Code sandboxing is useful for many purposes, but most sandboxing techniques require kernel modifications, do not completely… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We present Scriptroute, a system that allows ordinary Internet users to conduct network measurements from remote vantage points… (More)
  • table 1
  • table 2
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Grid computing systems that have been the focus of much research activities in recent years provide a virtual framework for… (More)
  • table 1
  • figure 1
  • table 2
  • table 3
  • table 4
Is this relevant?
Highly Cited
1996
Highly Cited
1996
Today’s extensible operating systems allow applications to modify kernel behavior by providing mechanisms for application code to… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Is this relevant?