Security kernel

Results: 400



#Item
61Microkernel / Capability-based security / Domain / Key / Windows key / Kernel / Function key / EROS / Memory protection / Computer architecture / Security / KeyKOS

The Keykos ArchitectureEighth Edition (DecemberThis paper was written by Norman Hardy and appeared in a slightly different form in Operating Systems Review,

Add to Reading List

Source URL: www.cap-lore.com

Language: English - Date: 2009-05-04 18:57:36
62Software / Common Criteria / Mandatory access control / National Information Assurance Partnership / Evaluation Assurance Level / Linux kernel / Security-Enhanced Linux / Linux / Protection Profile / Computer security / Evaluation / Computing

National Information Assurance Partnership ® TM

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
63Pcap / Tcpdump / Wireshark / Network Driver Interface Specification / Firewall / Packet capture / Architecture of Windows NT / Transmission Control Protocol / Kernel / Software / Computer network security / Berkeley Packet Filter

An Architecture for High Performance Network Analysis Fulvio Risso and Loris Degioanni Dipartimento di Automatica e Informatica – Politecnico di Torino Corso Duca degli Abruzzi, 24 – 10129 Torino, Italy {risso,degio

Add to Reading List

Source URL: www.winpcap.org

Language: English - Date: 2010-09-05 10:10:56
64Evaluation / Common Criteria / Evaluation Assurance Level / Red Hat Enterprise Linux / Linux kernel / Security-Enhanced Linux / Red Hat / National Information Assurance Partnership / Linux / Computing / Computer security / Software

National Information Assurance Partnership ® TM

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
65Embedded Linux / Smartphones / Windows NT architecture / Cross-platform software / Android / Mandatory access control / Architecture of Windows NT / Kernel / Linux Security Modules / Computing / Software / Computer architecture

Poster: Full Support for Reference Monitoring in Android’s Application Framework Michael Backes Sven Bugiel

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:32
66Malware / Kernel / Linux kernel / Portable Executable / Software / System software / Computer architecture

Poster: Classifying Downloaders Yu Ding1 , Liang Guo3 ,Chao Zhang2 , Yulong Zhang2 , Hui Xue2 , Tao Wei2 , Yuan Zhou3 , Xinhui Han1 Peking University1 , UC Berkeley2 , Beihang University3 {dingelish,greenpear1991,gausszh

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:25
67

Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers

Add to Reading List

Source URL: www.ieee-security.org

- Date: 2012-06-05 18:19:24
    68

    S PROBES: Enforcing Kernel Code Integrity on the TrustZone Architecture Xinyang Ge, Hayawardh Vijayakumar, and Trent Jaeger System and Internet Infrastructure Security Laboratory The Pennsylvania State University {xxg113

    Add to Reading List

    Source URL: www.mostconf.org

    Language: English - Date: 2014-05-17 09:17:54
      69

      2013 IEEE Symposium on Security and Privacy Practical Timing Side Channel Attacks Against Kernel Space ASLR Ralf Hund, Carsten Willems, Thorsten Holz Horst-Goertz Institute for IT Security Ruhr-University Bochum

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2013-04-05 19:56:24
        70

        A Security Enforcement Kernel for OpenFlow Networks HotSDN 2012 Phillip Porras, Vinod Yegneswaran, Martin Fong, Mabry Tyson (SRI International) Seungwon Shin, Guofei Gu

        Add to Reading List

        Source URL: conferences.sigcomm.org

        Language: English - Date: 2012-10-28 13:57:35
          UPDATE