Security kernel

Results: 400



#Item
11Computer security / Computer access control / Software / Computing / Access control / Memory management / Memory protection / Kernel / Capability-based security / Operating system / Access Control Matrix / File system

Protection1 Butler W. Lampson Xerox Corporation Palo Alto, California Abstract

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 1997-12-31 17:54:34
12Software engineering / Security / Computer programming / Access control / Computer access control / Kernel / JavaScript / Object-oriented programming / Data-flow analysis / Database / Program analysis

Leveraging “Choice” to Automate Authorization Hook Placement Divya Muthukumaran Trent Jaeger

Add to Reading List

Source URL: www.cse.psu.edu

Language: English - Date: 2012-12-21 22:14:54
13Software / Computing / Computer architecture / Computing platforms / Monolithic kernels / Kernel / Linux kernel / Address space layout randomization / Linux / Android / User space

Anatomy of a Remote Kernel Exploit Dan Rosenberg Copyright © 2011 Virtual Security Research, LLC.

Add to Reading List

Source URL: vulnfactory.org

Language: English - Date: 2012-01-16 13:38:49
14Computer security / System software / Software / Trusted computing base / Mandatory access control / Security-Enhanced Linux / Kernel / Policy Monitoring / System call / XTS-400

The Case for Abstracting Security Policies   

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-13 14:58:02
15Computer security / Security / Computing / Software testing / Security Target / Vulnerability / Evaluation Assurance Level / Kernel / Common Criteria / Open-source movement

Microsoft Word - Trusting_Developers_Whitepaper_cc-3.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-10 07:41:12
16System calls / Computer security / Information theory / Principle of least privilege / Privilege / Solaris / Linux kernel / Protection ring / File system / Device driver / Sun Microsystems / Procfs

Opinion: Least Privilege for Solaris Subject Submitted by File Date

Add to Reading List

Source URL: us-east.manta.joyent.com

Language: English - Date: 2013-07-25 17:58:00
17Computing platforms / Software metrics / Linux kernel / LLVM / Clang / Linux / Kernel / Source lines of code / Compiler / Mach

Research Report: Analysis of Software for Restricted Computational Environment Applicability Jacob I. Torrey and Jonathan Miodownik Assured Information Security Greenwood Village, CO, USA {torreyj, miodownikj}@ainfosec.c

Add to Reading List

Source URL: spw16.langsec.org

Language: English - Date: 2016-06-05 23:38:45
18National Security Agency / Security-Enhanced Linux / Mandatory access control / Type enforcement / Multilevel security / Linux kernel / File system permissions

Adding Ramparts to Your Bastille An Introduction to SELinux Hardening Def Con 24 Packet Capture Village Jay Beale

Add to Reading List

Source URL: www.inguardians.com

Language: English - Date: 2016-08-05 14:35:56
19System calls / OpenBSD / Systrace / Time of check to time of use / Kernel / Exec / Wrapper function / Linux kernel / Wrapper / Architecture of Windows NT / Ioctl

Exploiting Concurrency Vulnerabilities in System Call Wrappers Robert N. M. Watson Security Research Group Computer Laboratory

Add to Reading List

Source URL: www.watson.org

Language: English - Date: 2007-08-06 09:53:24
20Unix / System administration / User identifier / Group identifier / Setuid / System calls / Principle of least privilege / Privilege separation / Su / Capability-based security / Kernel / File system permissions

Setuid Demystified∗ Hao Chen David Wagner University of California at Berkeley {hchen,daw}@cs.berkeley.edu

Add to Reading List

Source URL: www.unixwiz.net

Language: English - Date: 2014-08-03 23:18:45
UPDATE