Security kernel

Results: 400



#Item
251Central processing unit / Computer security / Malware / Rootkit / Hypervisor / Portable Executable / Xen / Mach-O / Loadable kernel module / System software / Software / Virtual machines

Hypervisor Support for Identifying Covertly Executing Binaries Lionel Litty H. Andr´es Lagar-Cavilla Dept. of Computer Science University of Toronto {llitty,andreslc}@cs.toronto.edu

Add to Reading List

Source URL: lagarcavilla.org

Language: English - Date: 2009-06-16 20:57:19
252Ring / MIPS architecture / Instruction set / 64-bit / Hypervisor / Reduced instruction set computing / Kernel / Capability-based security / Memory protection / Computer architecture / Central processing unit / Instruction set architectures

Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-06-18 09:34:49
253MIPS architecture / Ring / Instruction set / 64-bit / Hypervisor / Reduced instruction set computing / Capability-based security / Kernel / Memory protection / Computer architecture / Central processing unit / Instruction set architectures

Capability Hardware Enhanced RISC Instructions: CHERI Instruction-set architecture

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2014-07-14 10:03:30
254Linux kernel / Computer security / Malware / Rootkit / Loadable kernel module / Kernel / Linux Security Modules / System software / Software / Computer architecture

Multi-Aspect Profiling of Kernel Rootkit Behavior

Add to Reading List

Source URL: eurosys2009.informatik.uni-erlangen.de

Language: English - Date: 2009-04-19 11:57:09
255Computer architecture / Software / Message authentication codes / Hashing / FIPS 140 / HMAC / Vidyo / Zeroisation / Critical Security Parameter / Cryptography standards / Cryptography / Computing

1B - Vidyo Cryptographic Security Kernel Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-20 10:16:00
256System software / FIPS 140 / Cryptographic Module Validation Program / Operating system / Loadable kernel module / Server / X Window System / Disk formatting / Cryptography standards / Software / Computing

Sterling Commerce Connect Direct Secure+ Option FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
257Cryptographic software / Computer security / FIPS 140-2 / S/MIME / FIPS 140 / Digital signature / Kernel / CryptGenRandom / Microsoft CryptoAPI / Cryptography / Cryptography standards / Public-key cryptography

Non-Proprietary FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
258Computer security / FIPS 140-2 / FIPS 140 / PCI Express / Security token / Hardware security module / Linux kernel / Memory protection / Access control / Cryptography standards / Computing / Security

nShield Security Policy ™ CI PHE R

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-01-28 00:00:00
259Hashing / Cryptographic protocols / Advanced Encryption Standard / FIPS 140-2 / FIPS 140 / Critical Security Parameter / Cryptographic hash function / Zeroisation / Loadable kernel module / Cryptography / Computing / Cryptography standards

Microsoft Word - 04b - Kernel Crypto Module Security Policy_IGL updates[removed]doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2010-12-21 00:00:00
260System software / FIPS 140 / Cryptographic Module Validation Program / Operating system / Loadable kernel module / Server / X Window System / Disk formatting / Cryptography standards / Software / Computing

Sterling Commerce Connect Direct Secure+ Option FIPS[removed]Security Policy

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
UPDATE