Security kernel

Results: 400



#Item
91Trusted computing / Espionage / Trusted Platform Module / Coprocessor / Tamper resistance / Kernel / Integrity / IBM / Secure cryptoprocessor / Computer security / Security / Cryptography

SECURITY Magic Boxes and Boots: Security in Hardware

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2005-08-19 15:35:31
92Trusted computing / Chain of trust / Kernel / Vulnerability / X Window System / DTrace / Field-programmable gate array / Ring / Trusted computing base / Computer security / Software / Computing

New Directions for Hardware-assisted Trusted Computing Policies (Position Paper) Sergey Bratus · Michael E. Locasto · Ashwin Ramaswamy · Sean W. Smith Dartmouth College

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-28 10:16:33
93System software / Cross-platform software / Linux kernel / Kernel / Application programming interfaces / Linux Security Modules / Software / Computing / Linux

Linux Plumbers Conference / LinuxCon EuropeHow to design a Linux kernel interface Michael Kerrisk man7.org Training and Consulting

Add to Reading List

Source URL: man7.org

Language: English - Date: 2015-05-07 06:42:59
94Security-Enhanced Linux / Linux Security Modules / Type enforcement / Linux-VServer / Sandbox / Linux kernel / Operating system-level virtualization / Kernel / Operating system / System software / Software / National Security Agency

Pastures: Towards Usable Security Policy Engineering Sergey Bratus, Alex Ferguson, Doug McIlroy, Sean Smith Dartmouth College Abstract will later review several such approaches that enjoy de facto

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2007-01-31 09:16:06
95Computer security / Malware / Rootkit / Ring / Hypervisor / Operating system / SCADA / Hardware virtualization / Kernel / System software / Software / Virtual machines

Chapter 1 LIGHTWEIGHT INTRUSION DETECTION FOR RESOURCE-CONSTRAINED EMBEDDED CONTROL SYSTEMS Jason Reeves, Ashwin Ramaswamy, Michael Locasto, Sergey Bratus, and Sean Smith

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-07-11 16:31:17
96Linux kernel / Monolithic kernels / Computer security / Malware / Rootkit / Kernel / Loadable kernel module / Hooking / Ring / System software / Software / Computer architecture

Countering Kernel Rootkits with Lightweight Hook Protection Zhi Wang Xuxian Jiang

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:03
97Rootkits / Malware / Chkrootkit / Hacker / Computer virus / Loadable kernel module / Kernel / The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System / Rkhunter / System software / Computer security / Cyberwarfare

Application of a Methodology to Characterize Rootkits Retrieved from Honeynets John Levine, Julian Grizzard, Henry Owen, Members, IEEE , , Abstract-- Techn

Add to Reading List

Source URL: users.ece.gatech.edu

Language: English - Date: 2004-08-12 13:59:29
98Computer security / Access control / Identity management / Operating system / Kernel / Ring / Android / Google Chrome / Malware / Software / Computing / Cloud clients

This paper appears at the 33rd IEEE Symposium on Security and Privacy (OaklandUser-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems Franziska Roesner, Tadayoshi Kohno {franzi, yo

Add to Reading List

Source URL: www.franziroesner.com

Language: English - Date: 2012-03-08 13:27:49
99Trusted computing / Microkernel / Security / Trusted computing base / Kernel / Trusted path / L4 microkernel family / Next-Generation Secure Computing Base / Ring / Computer security / Computer architecture / System software

To be published in Proceedings of the 11th ACM SIGOPS European Workshop, Leuven, Belgium, 2004 Reducing TCB size by using untrusted components — small kernels versus virtual-machine monitors Michael Hohmuth

Add to Reading List

Source URL: www.eros-os.org

Language: English - Date: 2005-10-18 08:59:18
100Cross-platform software / National Security Agency / Security-Enhanced Linux / Mandatory access control / TOMOYO Linux / Embedded Linux / Linux kernel / Operating system / Linux Security Modules / Computer security / Computer architecture / Software

Attacking and Defending Networked Embedded Devices Kwang-Hyun Baek Sergey Bratus Sara Sinclair

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-03-13 10:38:09
UPDATE