Security kernel

Results: 400



#Item
111Computer network security / Hacking / Software bug / Password / Cross-site scripting / Vulnerability / Kernel / Security token / Two-factor authentication / Computer security / Cyberwarfare / Security

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-12-06 13:14:25
112Chroot / Kernel / Capability-based security / Operating system / Unix / Privilege escalation / Microkernel / User identifier / Principle of least privilege / System software / Computer security / Software

Make Least Privilege a Right (Not a Privilege) Maxwell Krohn∗ , Petros Efstathopoulos† , Cliff Frey∗ , Frans Kaashoek∗ , Eddie Kohler† , David Mazi`eres‡ , Robert Morris∗ , Michelle Osborne‡ , Steve VanDe

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2005-05-06 16:45:01
113Linux kernel / Linux / Cross-platform software / Kernel / Git / Merge window / Andrew Morton / Mm tree / Linux Security Modules / Software / Computing / Computer architecture

PDF Document

Add to Reading List

Source URL: www.linux-magazine.com

Language: English
114Asbestos / Mandatory access control / Multilevel security / Kernel / Process management / Server / Operating system / EROS / Principle of least privilege / Computer security / Computing / Computer architecture

Labels and Event Processes in the Asbestos Operating System STEVE VANDEBOGART, PETROS EFSTATHOPOULOS, and EDDIE KOHLER University of California, Los Angeles MAXWELL KROHN, CLIFF FREY, DAVID ZIEGLER, FRANS KAASHOEK, and R

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2007-12-14 14:49:25
115Memory management / Real-time operating systems / Central processing unit / Kernel / Ring / Multics / Operating system / Capability-based security / Microkernel / System software / Computer architecture / Software

Capabilities Revisited: A Holistic Approach to Bottom-to-Top Assurance of Trustworthy Systems Peter G. Neumann and Robert N. M. Watson SRI International Computer Science Laboratory and University of Cambridge Computer La

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-03-01 06:45:15
116Denial-of-service attack / Internet Relay Chat / Computing / SYN cookies / Transmission Control Protocol / Internet / Denial-of-service attacks / Computer network security / Cyberwarfare

Protocol Analysis and Defeating DDoS in FreeBSD Kernel Playing with Packet Filter Hooks Nebi Şenol YILMAZ Senior Consultant / Managing Partner Secrove Information Security Consulting

Add to Reading List

Source URL: www.secrove.com

Language: English - Date: 2012-05-28 13:15:37
117Real-time operating systems / Memory management / Access control / Capability-based security / Memory protection / Kernel / EROS / Object-capability model / Memory management unit / Computing / Computer architecture / System software

CHERI: A Hybrid Capability-System Architecture for Scalable Software Compartmentalization Robert N. M. Watson∗ , Jonathan Woodruff∗ , Peter G. Neumann† , Simon W. Moore∗ , Jonathan Anderson‡ , David Chisnall∗

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-04-13 12:22:46
118Virtual machines / Hyper-V / Hypervisor / Virtualization / Microkernel / Architecture of Windows NT / Ring / Virtual private server / Comparison of platform virtual machines / System software / Software / Windows Server

Windows Server Virtualization & The Windows Hypervisor Brandon Baker Lead Security Engineer Windows Kernel Team

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
119Computer security / Windows NT / Access token / Privilege escalation / Architecture of Windows NT / Kernel / Linux kernel / Windows Vista / Operating system / Microsoft Windows / Software / Computing

TECHNICAL WHITE PAPER Easy local Windows Kernel exploitation Abstract In this paper I detail how to easily exploit some kind of windows kernel vulnerabilities. This is

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-07-22 17:40:37
120Computer architecture / C dynamic memory allocation / Architecture of Windows NT / Struct / Circular buffer / Fragmentation / Page / Memory pool / Free list / Memory management / Computing / Computer hardware

Kernel Pool Exploitation on Windows 7 Tarjei Mandt Abstract. In Windows 7, Microsoft introduced safe unlinking to address the growing number of security bulletins affecting the Windows kernel. Prior

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:19
UPDATE