Systrace

Systrace is a computer security utility which limits an application's access to the system by enforcing access policies for system calls. This can… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2003-2015
012320032015

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Most of Android users have experienced issues with the battery life. One cause of battery drainage is the usage of the Wakelocks… (More)
  • table 1
  • figure 2
  • figure 1
  • figure 4
  • figure 7
Is this relevant?
2015
2015
Investigation of the runtime behavior is one of the most important processes for performance tuning on a computer system… (More)
  • table 1
  • figure 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
2010
2010
Artificial Immune Systems have been successfully applied to a number of problem domains including fault tolerance and data mining… (More)
  • figure 1
  • table 1
  • table 2
  • figure 2
  • table 3
Is this relevant?
2007
2007
System call interposition allows the kernel security model to be extended. However, when combined with current operating systems… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2007
2007
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
Review
2007
Review
2007
Existing approaches to software security and reliability have proven inadequate in offering a good tradeoff between the assurance… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2004
2004
The systrace system-call interposition mechanism has become a popular method for containing untrusted code through program… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2004
2004
In the past, operating systems tended to lack well-defined access control policy specification languages and syntax. For example… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
We introduce a system that eliminates the need to run programs in privileged process contexts. Using our system, programs run… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?