Back to Results
First PageMeta Content
Linux kernel / Monolithic kernels / Kernel / Grsecurity / Rootkit / Ring / PaX / Loadable kernel module / Mandatory access control / System software / Software / Computer architecture


Intrusion detection for resource-constrained embedded control systems in the power grid
Add to Reading List

Document Date: 2012-06-21 17:59:04


Open Document

File Size: 423,13 KB

Share Result on Facebook

City

Gainesville / Santa Clara / Piscataway / Heidelberg / mountain view / Bedford / Los Angeles / Calgary / Hanover / Sebastopol / /

Company

Schweitzer Engineering Laboratories / SourceForge.net / Mitre Corporation / Elsevier B.V. / Intel Corporation / Pullman / Motorola Solutions / /

Country

Canada / Germany / United States / /

/

Event

Reorganization / /

Facility

University of Illinois / power grid Jason Reeves a / ∗ / Dartmouth College / power grid The / Disassembler Library / University of Calgary / Institute of Electrical / University of California at Los Angeles / /

IndustryTerm

grid systems / important devices / remote management systems / energy usage / energy / automation computing platform data sheet / external solution / virtualized and in-kernel security solutions / power grid control systems / communication protocols / portable tools / computing / less-than-secure technologies / control devices / Apache web server / security solutions / larger devices / embedded systems / industrial control systems / read-only memory chip / security device / architectures software developer / virtualized intrusion detection solutions / legacy applications / intelligent electronic devices / resource-constrained embedded control systems / targeted devices / resource-intensive solutions / dualcore processor / control systems / embedded control systems / real-time operating system / antivirus systems / production power systems / guest software / updating the guest software / /

OperatingSystem

Unix / VMs / Ubuntu / Windows XP / Solaris / Microsoft Windows / Linux / /

Organization

TCIPG Summer School on Cyber Security for Smart Energy Systems / Dartmouth College / University of California at Los Angeles / Institute of Electrical / Institute of Electrical and Electronics Engineers / Department of Energy / United States Government / University of Illinois / Department of Computer Science / University of Calgary / Department of Homeland Security / Center for Embedded Network Sensing / /

Person

Sergey Bratus / Tim Yardley / Sean Smith / Dan Rosenberg / Jason Reeves / Ashwin Ramaswamy / David Buehler / Jon Oberheide / Chris Ewing / Dennis Gammel / David Whitehead / /

Position

character driver / author / entry hooking /proc entry hooking VFS hooking Driver / representative / driver / Corresponding author / architectures software developer / /

Product

Autoscopy Jr. / /

ProgrammingLanguage

L / R / C / /

ProvinceOrState

California / Alberta / New Jersey / Illinois / Florida / Massachusetts / New Hampshire / Washington / /

PublishedMedium

Phrack / /

Technology

1.6 GHz processor / RAM / Linux / operating system / html / 2 GHz processor / real-time operating system / memory chip / 200 MHz PowerPC-based processor / virtual machine / operating systems / pdf / less-than-secure technologies / paging / caching / 2 GHz dualcore processor / communication protocols / web server / /

URL

www.s0ftpj.org/docs/lkm.htm / www.elsevier.com/locate/ijcip / www.s0ftpj.org/en/tools.html / www.invisiblethingslab.com/resources / www.symantec / www.kernel.org/doc/Documentation/kprobes.txt / www.phrack.org/issues.html? / www.sciencedirect.com / www.kernel.org/doc/Documentation/trace/ftrace / www.phrack.com/issues.html?issue=59&id=10 / www.openwall.com/linux / www.selinc.com/WorkArea/DownloadAsset / www.selinc.com / www.motorola.com/web/Business / www.spec.org/cpu2000 / /

SocialTag