<--- Back to Details
First PageDocument Content
Security / Windows Vista / Windows NT architecture / Kernel / Ring / Operating system / Principle of least privilege / Architecture of Windows NT / Application software / Computer security / Computing / Computer architecture
Date: 2011-07-13 02:26:31
Security
Windows Vista
Windows NT architecture
Kernel
Ring
Operating system
Principle of least privilege
Architecture of Windows NT
Application software
Computer security
Computing
Computer architecture

User-Driven Access Control: A New Model for Granting Permissions in Modern Operating Systems Franziska Roesner∗ Qualifying Examination Project — April 19, 2011 Advised by Tadayoshi Kohno (UW) and Helen Wang (MSR)

Add to Reading List

Source URL: www.franziroesner.com

Download Document from Source Website

File Size: 507,45 KB

Share Document on Facebook

Similar Documents

Meltdown Reading Kernel Memory from User Space Moritz Lipp1 , Michael Schwarz1 , Daniel Gruss1 , Thomas Prescher2 , Werner Haas2 , Anders Fogh3 , Jann Horn4 , Stefan Mangard1 , Paul Kocher5 , Daniel Genkin6 , Yuval Yarom

Meltdown Reading Kernel Memory from User Space Moritz Lipp1 , Michael Schwarz1 , Daniel Gruss1 , Thomas Prescher2 , Werner Haas2 , Anders Fogh3 , Jann Horn4 , Stefan Mangard1 , Paul Kocher5 , Daniel Genkin6 , Yuval Yarom

DocID: 1xVgv - View Document

Hyperkernel: Push-Button Verification of an OS Kernel

Hyperkernel: Push-Button Verification of an OS Kernel

DocID: 1xVeg - View Document

Hyperkernel: Push-Button Verification of an OS Kernel Luke Nelson, Helgi Sigurbjarnarson, Kaiyuan Zhang, Dylan Johnson, James Bornholt, Emina Torlak, and Xi Wang University of Washington {lukenels,helgi,kaiyuanz,dgj16,bo

Hyperkernel: Push-Button Verification of an OS Kernel Luke Nelson, Helgi Sigurbjarnarson, Kaiyuan Zhang, Dylan Johnson, James Bornholt, Emina Torlak, and Xi Wang University of Washington {lukenels,helgi,kaiyuanz,dgj16,bo

DocID: 1xUUc - View Document

Meltdown: Reading Kernel Memory from User Space Moritz Lipp1 , Michael Schwarz1 , Daniel Gruss1 , Thomas Prescher2 , Werner Haas2 , Anders Fogh3 , Jann Horn4 , Stefan Mangard1 , Paul Kocher5 , Daniel Genkin6,9 , Yuval Ya

Meltdown: Reading Kernel Memory from User Space Moritz Lipp1 , Michael Schwarz1 , Daniel Gruss1 , Thomas Prescher2 , Werner Haas2 , Anders Fogh3 , Jann Horn4 , Stefan Mangard1 , Paul Kocher5 , Daniel Genkin6,9 , Yuval Ya

DocID: 1xU6r - View Document

PDF Document

DocID: 1xPhq - View Document