A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Tracer
2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS '11
Enforcing a practical Mandatory Access Control (MAC) in a commercial operating system to tackle malware problem is a grand challenge but also a promising approach. The firmest barriers to apply MAC to defeat malware programs are the incompatible and unusable problems in existing MAC systems. To address these issues, we start our work by analyzing the technical details of 2,600 malware samples one by one and performing experiments over two types of MAC enforced operating systems. Based on the
doi:10.1145/1966913.1966932
dblp:conf/ccs/ShanWC11
fatcat:waok7lsumrdbzacya4t4gynoyy