Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 217,797,675 papers from all fields of science
Search
Sign In
Create Free Account
Sandbox (computer security)
Known as:
Software fault isolation
, Sandboxed
, Sandbox
Expand
In computer security, a sandbox is a security mechanism for separating running programs. It is often used to execute untested or untrusted programs…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Acronis True Image
Android
App Store Approval Process
Application firewall
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2015
Highly Cited
2015
S$A: A Shared Cache Attack That Works across Cores and Defies VM Sandboxing -- and Its Application to AES
Gorka Irazoqui Apecechea
,
T. Eisenbarth
,
B. Sunar
IEEE Symposium on Security and Privacy
2015
Corpus ID: 7499994
The cloud computing infrastructure relies on virtualized servers that provide isolation across guest OS's through sand boxing…
Expand
Highly Cited
2011
Highly Cited
2011
Automatic analysis of malware behavior using machine learning
Konrad Rieck
,
Philipp Trinius
,
Carsten Willems
,
Thorsten Holz
Journal of computing and security
2011
Corpus ID: 14442835
Malicious software - so called malware - poses a major threat to the security of computer systems. The amount and diversity of…
Expand
Highly Cited
2010
Highly Cited
2010
Efficient Cache Attacks on AES, and Countermeasures
Eran Tromer
,
Dag Arne Osvik
,
A. Shamir
Journal of Cryptology
2010
Corpus ID: 9028748
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU’s memory cache…
Expand
Highly Cited
2010
Highly Cited
2010
Privilege Escalation Attacks on Android
Lucas Davi
,
A. Dmitrienko
,
A. Sadeghi
,
M. Winandy
Information Security Conference
2010
Corpus ID: 9224109
Android is a modern and popular software platform for smartphones. Among its predominant features is an advanced security model…
Expand
Highly Cited
2010
Highly Cited
2010
An Android Application Sandbox system for suspicious software detection
Thomas Bläsing
,
L. Batyuk
,
Aubrey-Derrick Schmidt
,
S. Çamtepe
,
S. Albayrak
International Conference on Malicious and…
2010
Corpus ID: 8753824
Smartphones are steadily gaining popularity, creating new application areas as their capabilities increase in terms of…
Expand
Review
2009
Review
2009
Native Client: A Sandbox for Portable, Untrusted x86 Native Code
Bennet S. Yee
,
D. Sehr
,
+6 authors
Nicholas Fullagar
IEEE Symposium on Security and Privacy
2009
Corpus ID: 8672745
This paper describes the design, implementation and evaluation of Native Client, a sandbox for untrusted x86 native code. Native…
Expand
Highly Cited
2006
Highly Cited
2006
Cache Attacks and Countermeasures: The Case of AES
Dag Arne Osvik
,
A. Shamir
,
Eran Tromer
The Cryptographer's Track at RSA Conference
2006
Corpus ID: 8034563
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU’s memory cache…
Expand
Highly Cited
2002
Highly Cited
2002
Globally Distributed Content Delivery
J. Dilley
,
B. Maggs
,
J. Parikh
,
H. Prokop
,
R. Sitaraman
,
W. Weihl
IEEE Internet Computing
2002
Corpus ID: 15600989
When we launched the Akamai system in early 1999, it initially delivered only Web objects (images and documents). It has since…
Expand
Highly Cited
2002
Highly Cited
2002
Secure Execution via Program Shepherding
Vladimir Kiriansky
,
Derek Bruening
,
Saman P. Amarasinghe
USENIX Security Symposium
2002
Corpus ID: 5897358
We introduce program shepherding, a method for monitoring control flow transfers during program execution to enforce a security…
Expand
Highly Cited
1996
Highly Cited
1996
Safe kernel extensions without run-time checking
G. Necula
,
Peter Lee
USENIX Symposium on Operating Systems Design and…
1996
Corpus ID: 988579
Abstract : This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE