Security kernel

Results: 400



#Item
131Microsoft Windows / Windows NT architecture / X86 architecture / Architecture of Windows NT / Operating system / Native API / Linux kernel / Kernel / Windows API / Computer architecture / Software / Computing

eEye Digital Security White Paper Remote Windows Kernel Exploitation Step into the Ring O by Barnaby Jack, Senior Research Engineer For more information on eEye Digital Security, please visit: www.eeye.com

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2008-06-07 19:38:54
132Public-key cryptography / Cryptographic protocols / Cryptography standards / Hardware security module / Microsoft CryptoAPI / PKCS / Transport Layer Security / Key generation / Key Wrap / Cryptography / Cryptographic software / Key management

A Linux kernel cryptographic framework: Decoupling cryptographic keys from applications Nikos Mavrogiannopoulos COSIC/ESAT – IBBT Katholieke Universiteit Leuven

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English
133Computer architecture / Randomness / Applied mathematics / Entropy / Random number generation / Cisco IOS / IOS / Mac OS X / Kernel / Pseudorandom number generators / Mach / Cryptography

Revisiting iOS Kernel (In)Security: Attacking the Early Random PRNG Tarjei Mandt CanSecWest 2014

Add to Reading List

Source URL: cansecwest.com

Language: English - Date: 2014-03-19 04:39:20
134Computer security / Malware / Rootkit / Computer network security / Linux kernel / Avira / Spyware / Kernel / Avast! / System software / Software / Antivirus software

Anti-Virus Comparative Single Product Test Safe’N’Sec Enterprise Pro Date: January 2008

Add to Reading List

Source URL: www.av-comparatives.org

Language: English - Date: 2013-01-25 05:17:45
135Virtual machines / Real-time operating systems / VxWorks / Multiple Independent Levels of Security / Embedded systems / Multilevel security / Simics / Operating system / Board support package / System software / Software / Computing

WIND RIVER VXWORKS MILS PLATFORM[removed]TABLE OF CONTENTS Run-Time Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Separation Kernel . . . . .

Add to Reading List

Source URL: www.windriver.com

Language: English - Date: 2015-02-27 13:09:14
136Digital television / Electronic design / Science / Conditional access / Tamper resistance / Smart card / System on a chip / StB / Kernel / Technology / Electronic engineering / Cryptography

Pay TV Transport Chip / STB SOC Security November 6, 2008 Presentation to the Copy Protection Technology Working Group (CPTWG) Neither the document nor the information contained therein may be duplicated, used, published

Add to Reading List

Source URL: www.cptwg.org

Language: English - Date: 2008-11-06 14:32:10
137National security / Computer network security / Electronic commerce / Secure communication / Multilevel security / Trusted computing base / Operating system / Kernel / Ring / Computer security / Security / Crime prevention

A Model of Security for Distributed Systems August 28, 1995 4:06 pm A New Model of Security for Distributed Systems Wm A. Wulf

Add to Reading List

Source URL: legion.virginia.edu

Language: English - Date: 1998-12-07 09:06:04
138Linux / Computer security / Malware / Rootkit / Ring / Kernel / Integrity / Linux kernel / Hypervisor / System software / Software / Computer architecture

S PROBES: Enforcing Kernel Code Integrity on the TrustZone Architecture Xinyang Ge, Hayawardh Vijayakumar, and Trent Jaeger System and Internet Infrastructure Security Laboratory The Pennsylvania State University {xxg113

Add to Reading List

Source URL: mostconf.org

Language: English - Date: 2014-05-17 09:17:54
139Computer security / Malware / Rootkit / Operating system / Kernel / Linux kernel / Android / X Window System / Software / System software / Computing

SPROBE: Enforcing Kernel Code Integrity on the TrustZone Architecture Xinyang Ge, Hayawardh Vijayakumar, and Trent Jaeger May 17th, 2014

Add to Reading List

Source URL: mostconf.org

Language: English - Date: 2014-05-17 18:33:34
UPDATE