@article{ConfusedDeputy, author = {Norm Hardy}, title = {The Confused Deputy (or why capabilities might have been invented)}, journal = {ACM SIGOPS Operating Systems Review}, number = {}, month = {octobre}, year = {1988} } @misc{ObjectsAsCaps, author = {Joe Duffy}, title = {Objects as Secure Capabilities}, howpublished = {\url{http://joeduffyblog.com/2015/11/10/objects-as-secure-capabilities/}}, note = {Dernier accès: 2018-09-12}, month = {novembre}, year = {2015} } @misc{JRabetBrowserSecurity, author = {Jordan Rabet}, title = {Browser Security Beyond Sandboxing}, howpublished = {\url{https://www.youtube.com/watch?v=sheeWKC6CuM}}, journal = {BlueHat IL Conferences}, year = {2018} } @misc{WindowsFastTCPLoopback, author = {Ed Briggs}, title = {Fast TCP Loopback Performance and Low Latency with Windows Server 2012 TCP Loopback Fast Path}, howpublished = {\url{https://blogs.technet.microsoft.com/wincat/2012/12/05/fast-tcp-loopback-performance-and-low-latency-with-windows-server-2012-tcp-loopback-fast-path/}}, month = {decembre}, year = {2012}, note = {Dernier accès: 2018-09-12} } @misc{ISCWindowsACL, title = {Windows Access Control List (ACL) 1}, howpublished = {\url{https://www.installsetupconfig.com/win32programming/accesscontrollistacl1.html}}, note = {Dernier accès: 2018-09-12} } @misc{BEP35, title = {BEP 35, Torrent Signing}, author = {Chris Brown}, howpublished = {\url{http://www.bittorrent.org/beps/bep_0035.html}} } @misc{SSLlibtorrent, title = {BitTorrent over SSL}, author = {arvid}, howpublished = {\url{https://blog.libtorrent.org/2012/01/bittorrent-over-ssl/}}, month = {janvier}, year = {2012} } @book{Lengyel:2011:MGP:2031513, author = {Lengyel, Eric}, title = {Mathematics for 3D Game Programming and Computer Graphics, Third Edition}, year = {2011}, isbn = {1435458869, 9781435458864}, edition = {3rd}, publisher = {Course Technology Press}, address = {Boston, MA, United States}, } @inproceedings{Felt:2011:PRA:2028067.2028089, author = {Felt, Adrienne Porter and Wang, Helen J. and Moshchuk, Alexander and Hanna, Steven and Chin, Erika}, title = {Permission Re-delegation: Attacks and Defenses}, booktitle = {Proceedings of the 20th USENIX Conference on Security}, series = {SEC'11}, year = {2011}, location = {San Francisco, CA}, pages = {22--22}, numpages = {1}, url = {http://dl.acm.org/citation.cfm?id=2028067.2028089}, acmid = {2028089}, publisher = {USENIX Association}, address = {Berkeley, CA, USA}, } @inproceedings{ComparingIPCLinux, author = {Mrs. S.Krishnaveni and Ms D. Ruby}, title = {Comparing and Evaluating the Performance of Inter Process Communicaiton Models in Linux Environment}, journal={International Journal of Trend in Research and Development (IJTRD)} } @article{keetch2009practicalsandboxing, title={Practical Sandboxing on the Windows Platform}, author={Keetch, Tom}, year={2009} } @misc{JForshawPrivEscal, author = {James Forshaw}, title = {Introduction to Logical Privilege Escalation on Windows}, howpublished = {\url{https://conference.hitb.org/hitbsecconf2017ams/materials/D2T3%20-%20James%20Forshaw%20-%20Introduction%20to%20Logical%20Privilege%20Escalation%20on%20Windows.pdf}} } @book{Karayanis:2005:MOG:1051376, author = {Karayanis, Catherine}, title = {More OpenGL Game Programming}, year = {2005}, isbn = {1592008305}, publisher = {Muska \& Lipman/Premier-Trade}, } @misc{GoogleProjectZero, author = {Google}, title = {Project Zero}, howpublished = {\url{https://googleprojectzero.blogspot.com/}} } @misc{GstreamerSecuIssue, author = {Hanno Böck}, title = {GStreamer and the state of Linux desktop security}, howpublished = {\url{https://lwn.net/Articles/707846/}} }