skip to main content
research-article
Free Access

Native Client: a sandbox for portable, untrusted x86 native code

Published:01 January 2010Publication History
First page image

References

  1. Accetta, M., baron, R., Bolosky, W., Golub, D., Rashid, R., Tevanian, A., Young, M. Mach: A New Kernel Foundation for UNIX Development. 1986, 93--112.Google ScholarGoogle Scholar
  2. Burns, J. developing secure mobile applications for android. http://isecpartners.com/files/iSEC_Securing_Android_Apps.pdf, 2008.Google ScholarGoogle Scholar
  3. Campbell, K., Gordon, L., Loeb, M., Zhou, L. The economic cost of publicly announced information security breaches: empirical evidence from the stock market. J. Comp. Secur. 11, 3 (2003), 431--448. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Cheriton, D.R. The V distributed system. Commun. ACM 31 (1988), 314--333. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Cohen, F.B. defense-in-depth against computer viruses. Comp. Secur. 11, 6 (1993), 565--584. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Crawford, J. Gelsinger, P. Programming 80386. Sybex Inc. (1991).Google ScholarGoogle Scholar
  7. Denning, A. ActiveX Controls Inside Out. Microsoft Press (May 1997). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Directorate for Command, Control, Communications and Computer systems, U.S. Department of defense Joint staff. Information assurance through defense-in-depth. Technical report, directorate for Command, Control, Communications and Computer systems, U.S. Department of defense Joint staff, Feb. 2000.Google ScholarGoogle Scholar
  9. Douceur, J.R., Elson, J., Howell, J., Lorch, J.R. Leveraging legacy code to deploy desktop applications on the web. In Proceedings of the 2008 Symposium on Operating System Design and Implementation (December 2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Ford, B., Cox, R. Vx32: lightweight user-level sandboxing on the x86. In 2008 USENIX Annual Technical Conference (June 2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Goldberg, I., Wagner, D., Thomas, R., brewer, E.A. A secure enviroment for untrusted helper applications. In Proceedings of the 6th USENIX Security Symposium (1996). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Golub, D., Dean, A., Forin, R., Rashid, R. UNIX as an application program. In Proceedings of the Summer 1990 USENIX Conference (1990), 87--95.Google ScholarGoogle Scholar
  13. Joy, W., Cooper, E., Fabry, R., Leffler, S., McKusick, K., Mosher, D. 4.2 BSD system manual. Technical report, Computer systems research Group, university of California, Berkeley, 1983.Google ScholarGoogle Scholar
  14. Kaspersky, K., Chang, A. remote code execution through Intel CPU bugs. In Hack In The Box (HITB) 2008 Malaysia Conference.Google ScholarGoogle Scholar
  15. McCamant, S., Morrisett, G. Efficient, verifable binary sandboxing for a CISC architecture. Technical report MIT-CSAIL-TR-2005--030, 2005.Google ScholarGoogle Scholar
  16. McCamant, S., Morrisett, G. Evaluating SFI for a CISC architecture. In 15th USENIX Security Symposium (Aug. 2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Microsoft Corporation. Signing and checking code with Authenticode. http://msdn.microsoft.com/en-us/library/ms537364(VS.85).aspx.Google ScholarGoogle Scholar
  18. Microsoft Corporation. Structured exception handling. http://msdn.microsoft.com/en-us/library/ms680657(VS.85).aspx, 2008.Google ScholarGoogle Scholar
  19. Netscape Corporation. Gecko plugin API reference. http://developer.mozilla.org/en/docs/Gecko_Plugin_API_Reference.Google ScholarGoogle Scholar
  20. Provos, N. Improving host security with system call policies. In USENIX Security Symposium (Aug. 2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Reinders, J. Intel Thread Building Blocks. O'Reilly&Associates, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Savage, M. Cost of computer viruses top $10 billion already this year. ChannelWeb, Aug. 2001.Google ScholarGoogle Scholar
  23. Small, C. MiSFIT: A tool for constructing safe extensible C++ systems. In Proceedings of the Third USENIX Conference on Object-Oriented Technologies (June 1997). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Stroustrup, B. The C++ Programming Language: Second Edition. Addison-Wesley, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Tarreau, W. ptrace documentation. http://www.linuxhq.com/kernel/v2.4/36--rc1/Documentation/ptrace.txt, 2007.Google ScholarGoogle Scholar
  26. U. S. Department of defense, Computer security Center. trusted computer system evaluation criteria, Dec. 1985.Google ScholarGoogle Scholar
  27. Wahbe, R., Lucco, S., Anderson, T.E., Graham, S.L. Efficient software-based fault isolation. ACM SIGOPS Oper. Sys. Rev. 27, 5 (dec. 1993), 203--216. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Native Client: a sandbox for portable, untrusted x86 native code

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Communications of the ACM
      Communications of the ACM  Volume 53, Issue 1
      Amir Pnueli: Ahead of His Time
      January 2010
      142 pages
      ISSN:0001-0782
      EISSN:1557-7317
      DOI:10.1145/1629175
      Issue’s Table of Contents

      Copyright © 2010 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 January 2010

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Popular
      • Refereed

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format .

    View HTML Format