Implementation of sandbox method for potentially malicious applications

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MC Sandbox - Tool Support for Method Configuration

Method configuration (MC) has been presented as a particular kind of method engineering (ME). ME in general is often a tedious and time consuming task and method configuration is no exception. Consequently, tool support is often required. In this paper we present an operationalization of the Method for Method Configuration into the tool support MC Sandbox. The functionality in MC Sandbox emphas...

متن کامل

development and implementation of an optimized control strategy for induction machine in an electric vehicle

in the area of automotive engineering there is a tendency to more electrification of power train. in this work control of an induction machine for the application of electric vehicle is investigated. through the changing operating point of the machine, adapting the rotor magnetization current seems to be useful to increase the machines efficiency. in the literature there are many approaches wh...

15 صفحه اول

Enter Sandbox: Android Sandbox Comparison

Expecting the shipment of 1 billion Android devices in 2017, cyber criminals have naturally extended their vicious activities towards Google’s mobile operating system. With an estimated number of 700 new Android applications released every day, keeping control over malware is an increasingly challenging task. In recent years, a vast number of static and dynamic code analysis platforms for analy...

متن کامل

secmodel sandbox : An application sandbox for NetBSD (draft)

We introduce a new security model for NetBSD – secmodel sandbox – that allows per-process policies for restricting privileges. Privileges correspond to kauth authorization requests, such as a request to create a socket or read a file, and policies specify the sandbox’s decision: deny, defer, or allow. Processes may apply multiple sandbox policies to themselves, in which case the policies stack,...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Izvestiâ vysših učebnyh zavedenij. Priborostroenie

سال: 2017

ISSN: 0021-3454

DOI: 10.17586/0021-3454-2017-60-10-940-944