منابع مشابه
Lockdown: Dynamic Control-Flow Integrity
Applications written in low-level languages without type or memory safety are especially prone to memory corruption. Attackers gain code execution capabilities through such applications despite all currently deployed defenses by exploiting memory corruption vulnerabilities. Control-Flow Integrity (CFI) is a promising defense mechanism that restricts open control-flow transfers to a static set o...
متن کاملSimplifying Network Management with Lockdown
The administrator of an enterprise network has a responsibility to enforce the policies on the network. Yet, most security mechanisms do not map well to the intended policies. This has been due to the prevalence of simplistic tools that have poor enforcement but, yet are easy to manage. While advanced commercial solutions do exist that have stronger enforcement, they are significantly harder to...
متن کاملLockdown: A Safe and Practical Environment for Security Applications
We describe, build, and evaluate Lockdown, a system that significantly increases the level of security for online transactions, even on a platform infested with malicious code. Lockdown provides the user with a highly-protected, yet also highly-constrained trusted environment for performing online transactions, as well as a high-performance, general-purpose environment for all other (non-securi...
متن کاملLockdown of an Orthopedic Department During COVID-19 Epidemics, Our Experience in a General Hospital
The COVID-19 disease is rapidly spreading around the world, affecting many countries and their healthcare systems.Like many other countries, Iran is struggling with the current situation. In this article, we aim to share our perspectiveson confronting obstacles mentioned above using appropriate hospital protocols during the COVID-19 crisis.We investigated and compared the numb...
متن کاملLockdown: Simplifying Enterprise Network Management with Local Context
The administrator of an enterprise network has a responsibility to enforce the policies on the network. Yet, most security mechanisms do not map well to the intended policies. This has been due to the prevalence of simplistic tools that have poor enforcement but, yet are easy to manage. While advanced commercial solutions do exist that have stronger enforcement, they are significantly harder to...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Communications of the ACM
سال: 2021
ISSN: 0001-0782,1557-7317
DOI: 10.1145/3465212