Security modeling in the COTS environment
References
Index Terms
- Security modeling in the COTS environment
Recommendations
Towards a COTS-Based Development Environment
ICCBSS '06: Proceedings of the Fifth International Conference on Commercial-off-the-Shelf (COTS)-Based Software SystemsSystems' developing using COTS components is very attractive since it promises costs and risks reduction as well as higher software quality. The process of such reuse development approach consists in examining the marketplace to identify potential COTS ...
BlackBox: lightweight security monitoring for COTS binaries
CGO '16: Proceedings of the 2016 International Symposium on Code Generation and OptimizationAfter a software system is compromised, it can be difficult to understand what vulnerabilities attackers exploited. Any information residing on that machine cannot be trusted as attackers may have tampered with it to cover their tracks. Moreover, even ...
Security Control for COTS Components
Using COTS components poses serious threats to system security. The authors analyze the risks and describe how their sandbox method can confine the damage potential of COTS components. The sandbox model was originally developed for fault tolerance. ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In

Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 532Total Downloads
- Downloads (Last 12 months)40
- Downloads (Last 6 weeks)6
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in