Security kernel

Results: 400



#Item
71

Bridging the Semantic Gap to Mitigate Kernel-Level Keyloggers

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2012-06-05 18:19:24
    72

    A Security Enforcement Kernel for OpenFlow Networks Phillip Porras† Seungwon Shin‡ Vinod Yegneswaran† Martin Fong† Mabry Tyson† Guofei Gu‡ † SRI International

    Add to Reading List

    Source URL: conferences.sigcomm.org

    Language: English - Date: 2012-07-10 10:31:22
      73

      Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2012-05-22 01:36:04
        74

        Poster: The Case for Provenance as a First Class Citizen in the Linux Kernel Thomas Moyer Department of Computer and Information Science University of Oregon, Eugene, OR

        Add to Reading List

        Source URL: www.ieee-security.org

        Language: English - Date: 2014-05-09 16:35:18
          75Cross-platform software / Java / CapDesk / Capability-based security / Sandbox / Computer security / Kernel / Computing / Software / System software

          A Security Analysis of the Combex DarpaBrowser Architecture David Wagner Dean Tribble March 4, 2002 1 Introduction We describe the results of a limited-time evaluation of the security of the Combex DarpaBrowser, built on

          Add to Reading List

          Source URL: combex.com

          Language: English - Date: 2005-08-18 16:59:47
          76Android / Embedded Linux / Smartphones / Unix / Monolithic kernels / Ioctl / Kernel / System call / Operating system / Software / Computer architecture / System software

          An Empirical Evaluation of the Android Security Framework? Alessandro Armando1,2 , Alessio Merlo1,3,?? , and Luca Verderame1 1 DIBRIS, Università degli Studi di Genova, Italy

          Add to Reading List

          Source URL: www.csec.it

          Language: English - Date: 2014-08-26 05:32:51
          77Computer security / Access control / Identity management / Operating system / Kernel / Ring / Android / Malware / Google Chrome / Software / Computing / Cloud clients

          User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems

          Add to Reading List

          Source URL: ieee-security.org

          Language: English - Date: 2012-05-22 01:33:56
          78Access control / Capability-based security / Kernel / Operating system / X Window System / Server / Unix / Software / System software / Computing

          Analyzing Capsicum for Usability and Performance Benjamin Farley December 23, 2010 Abstract

          Add to Reading List

          Source URL: pages.cs.wisc.edu

          Language: English - Date: 2010-12-23 01:59:20
          79Evaluation / Red Hat Enterprise Linux / Common Criteria / Evaluation Assurance Level / Security Target / Linux kernel / Protection Profile / Linux / Red Hat / Computing / Computer security / Software

          Microsoft Word - RedHat_security_target_eal4_v2-6.doc

          Add to Reading List

          Source URL: www.niap-ccevs.org

          Language: English - Date: 2009-10-08 10:40:04
          80Computer network security / Internet Protocol / IPv6 / Trusted computing base / Computer network / Virtual private network / Kernel / Capability-based security / Ring / Computer security / Security / Computing

          An Overview of the Annex System D.A. Grove T.C. Murray C.A. Owen C.J. North J.A. Jones M.R. Beaumont

          Add to Reading List

          Source URL: www.acsac.org

          Language: English - Date: 2007-12-17 22:49:19
          UPDATE