Back to Results
First PageMeta Content
Linux / Monolithic kernels / FreeBSD / Loadable kernel module / Rootkit / Linux kernel / Kernel / Integrity / Ring / Computer architecture / System software / Software


Tech Digest Figure Template_2 column_01-06-12
Add to Reading List

Document Date: 2013-09-26 17:11:39


Open Document

File Size: 505,90 KB

Share Result on Facebook

City

Scalable Trusted Computing / /

Company

APL / Wilson / Trusted Computing Group / /

/

IndustryTerm

government applications / appraisal server / target communications / malicious software signatures / kernel software / trustworthy systems / application-level software / physical hardware / software integrity measurement / application software / legacy systems / data management / defensive tools / targeted deployment networks / automated software invariant generation / prototype solution / dynamic integrity measurement systems / mission-oriented software / software developers / tactical networks / valid software / file systems / detection software runs / software assurance / software targets / long-lived in-memory software modifications / measured mission software / alert management / target systems / mobile computing community / antivirus systems / malicious software / software architecture / legitimate software / target software / measurement algorithm / /

OperatingSystem

Mac OS / Integrity / VMs / Linux / Microsoft Windows / /

Organization

Research Directorate / National Security Agency / /

Person

Kathleen N. McGill / J. Aaron Pendergrass / /

Position

driver / VM manager / /

ProgrammingLanguage

C / /

ProvinceOrState

New York / Massachusetts / /

Technology

Symmetric multiprocessing / Virtualization technology / measurement algorithm / LKIM measurement algorithm / Linux / mobile computing / caching / Antivirus software / simulation / operating system / operating systems / mobile devices / /

URL

www.jhuapl.edu/techdigest / /

SocialTag