Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,469,034 papers from all fields of science
Search
Sign In
Create Free Account
Sandbox (computer security)
Known as:
Software fault isolation
, Sandboxed
, Sandbox
Expand
In computer security, a sandbox is a security mechanism for separating running programs. It is often used to execute untested or untrusted programs…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Acronis True Image
Android
App Store Approval Process
Application firewall
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Web Server Load Balancing Based On Memory Utilization Using Docker Swarm
Mochamad Rexa Mei Bella
,
Mahendra Data
,
Widhi Yahya
International Conference on Sustainable…
2018
Corpus ID: 121370843
Recently, container-based virtualization is gaining popularity. It is a lightweight virtualization, which utilizes the…
Expand
2016
2016
A Live Virtual Simulator for Teaching Cybersecurity to Information Technology Students
M. Ernits
,
K. Kikkas
Interacción
2016
Corpus ID: 42447778
This paper introduces an Intelligent Training Exercise Environment (i-tee), a fully automated, open source platform for cyber…
Expand
2016
2016
Bypassing modern sandbox technologies
Gustav Lundsgård
,
Victor Nedström
2016
Corpus ID: 114300678
Malware (malicious software) is becoming an increasing problem, as it continuously grows both in numbers and complexity…
Expand
Review
2014
Review
2014
A Survey on the Security Fight againstRansomware and Trojans in Android
T. T. Gotora
,
Kudakwashe Zvarevashe
,
N. Pranav
,
An
2014
Corpus ID: 55109044
Android has taken the world of mobile computing to a whole different level and made possible persuasive interaction between user…
Expand
2012
2012
Overlay Window Management: User interaction with multiple security domains
Norman Feske
,
C. Helmuth
2012
Corpus ID: 18401465
Graphical user interfaces for high-assurance systems must fulfill a range of security requirements such as protected and reliable…
Expand
2010
2010
Performance Analysis of Sandboxes for Reactive Tasks
Bruce Merry
2010
Corpus ID: 56314110
Security mechanisms for programming contests introduce some overhead into time mea- surements. When large numbers of system calls…
Expand
2010
2010
A new design of a system for contest management and grading in informatics competitions
Bojan Kostadinov
,
M. Jovanov
,
E. Stankov
2010
Corpus ID: 18441591
Competitions in informatics are usually synonyms for algorithmic programming contests. Many of these competitions use automatic…
Expand
2008
2008
Using Virtual Machines in Desktop Grid Clients for Application Sandboxing
A. Marosi
,
P. Kacsuk
,
G. Fedak
,
O. Lodygensky
2008
Corpus ID: 56631551
A process for the preparation of a substituted guanidine by reacting a substituted cyanamide with ammonia or a substituted amine…
Expand
2005
2005
General 3D acquisition and tracking of dot targets on a Mars rover prototype
T. Litwin
IEEE International Conference on Systems, Man and…
2005
Corpus ID: 6987591
In June and July 2003 two Mars Exploration Rovers were launched to the Red Planet. Back on Earth, engineering-model rovers were…
Expand
2000
2000
From Sandbox to "Fundbox": Weaving participatory design into the fabric of a busy non-profit
R. Trigg
2000
Corpus ID: 107326799
This paper documents the experience of doing participatory design in a small non-profit staffed by an empowered workforce. The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE