Grsecurity

Results: 29



#Item
21Linux kernel / RSBAC / Linux Security Modules / Access control / Mandatory access control / FLASK / Type enforcement / Grsecurity / PaX / Computer security / System software / Software

RSBAC - a framework for enhanced Linux system security Marek Jawurek∗ RWTH-Aachen Abstract Operating systems traditionally bring their own means of protection against any kind of threats. But often the system’s secur

Add to Reading List

Source URL: www.rsbac.org

Language: English - Date: 2006-05-02 09:37:02
22Folder / Daemon / Operating system-level virtualization / Cd / Root directory / BIND / Grsecurity / System software / Software / Chroot

Chroot−BIND HOWTO Chroot−BIND HOWTO Table of Contents Chroot−BIND HOWTO.....................................................................................................................................1

Add to Reading List

Source URL: www.tldp.org

Language: English - Date: 2008-12-14 11:52:44
23Crime prevention / National security / Role-based access control / Unix / Operating system / Su / BoKS / Grsecurity / Security / Computer security / Access control

Secure4Privilege S4Software, Inc. Addressing system acccess

Add to Reading List

Source URL: www.s4software.com

Language: English - Date: 2010-03-23 17:54:52
24Software / C Standard Library / Address space layout randomization / PaX / Return-to-libc attack / Stack buffer overflow / Grsecurity / Buffer overflow / Prelink / Computing / Computer security / Software bugs

On the Effectiveness of Address-Space Randomization Hovav Shacham Matthew Page Ben Pfaff

Add to Reading List

Source URL: benpfaff.org

Language: English - Date: 2014-06-05 00:52:52
25System administration / Operating system-level virtualization / Sandbox / Operating system / Unix / File system / Ghost / Grsecurity / Authbind / System software / Software / Chroot

Florida State University College of Arts and Sciences Department of Computer Science

Add to Reading List

Source URL: www.cs.fsu.edu

Language: English - Date: 2012-09-05 15:29:48
26Computer network security / Windows Server / Chroot / Server / Multilevel security / Internet security / Grsecurity / System software / Software / Computer security

S E C U R I T Y L I B R A R Y Mandator y Protection for

Add to Reading List

Source URL: www.cryptosmith.com

Language: English - Date: 2011-03-19 12:01:40
27Computer security / Android / Embedded Linux / Smartphones / Mandatory access control / Grsecurity / Sandbox / Principle of least privilege / Linux kernel / System software / Software / Computing

The Case for SE Android Stephen Smalley

Add to Reading List

Source URL: selinuxproject.org

Language: English - Date: 2011-09-13 09:25:39
28Gentoo Linux / Hardened Gentoo / Security-Enhanced Linux / Grsecurity / Mandatory access control / RSBAC / Access control list / Linux Security Modules / Type enforcement / Computer security / System software / Access control

SELinux and grsecurity: A Case Study Comparing Linux Security Kernel Enhancements Michael Fox, John Giordano, Lori Stotler, Arun Thomas

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2005-08-24 18:01:26
29Software bugs / Linux / Exec Shield / PaX / Buffer overflow / NX bit / Stack buffer overflow / Grsecurity / Data Execution Prevention / Computer security / Computing / Software

PDF Document

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2004-08-30 12:57:45
UPDATE