Security kernel

Results: 400



#Item
271Unix / Linux / Linux kernel / File system / Operating system / Runlevel / GNU GRUB / Arch Linux / Security-Enhanced Linux / Software / System software / Computing

Introduction to Linux A Hands on Guide Machtelt Garrels Garrels.be

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2008-06-06 09:26:05
272Unix / Linux / Linux kernel / File system / Operating system / Runlevel / GNU GRUB / Arch Linux / Security-Enhanced Linux / Software / System software / Computing

Introduction to Linux A Hands on Guide Machtelt Garrels Garrels.be

Add to Reading List

Source URL: gd.tuwien.ac.at

Language: English - Date: 2008-06-06 09:26:05
273Monolithic kernels / Kernel / Ring / Mandatory access control / Architecture of Windows NT / Operating system / Mach / Trusted computing base / Linux kernel / Computer architecture / System software / Software

Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2008-10-09 13:10:59
274Computer security / Linux kernel / Operating system kernels / Kernel / Loadable kernel module / Ioctl / Rootkit / Architecture of Windows NT / Principle of least privilege / Computer architecture / System software / Computing

Software fault isolation with API integrity and multi-principal modules Yandong Mao, Haogang Chen, Dong Zhou† , Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek MIT CSAIL, † Tsinghua University IIIS A BSTRACT

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2014-09-23 03:33:34
275Software bugs / Software testing / Computer network security / Hacking / Malware / Vulnerability / Privilege escalation / Linux kernel / Kernel / Computer security / Cyberwarfare / Computing

Linux kernel vulnerabilities: State-of-the-art defenses and open problems Haogang Chen Yandong Mao Xi Wang Dong Zhou†

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
276Monolithic kernels / Kernel / Ring / Mandatory access control / Architecture of Windows NT / Operating system / Mach / Trusted computing base / Linux kernel / Computer architecture / System software / Software

Hardware Enforcement of Application Security Policies Using Tagged Memory Nickolai Zeldovich∗ , Hari Kannan† , Michael Dalton† , and Christos Kozyrakis† ∗ † MIT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
277Computer security / Linux kernel / Operating system kernels / Kernel / Loadable kernel module / Ioctl / Rootkit / Architecture of Windows NT / Principle of least privilege / Computer architecture / System software / Computing

Software fault isolation with API integrity and multi-principal modules Yandong Mao, Haogang Chen, Dong Zhou† , Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek MIT CSAIL, † Tsinghua University IIIS A BSTRACT

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
278VMware / Aspect-oriented software development / EMC Corporation / Virtual machine / Aspect-oriented programming / Microkernel / Kernel / Wireless security / OpenVMS / Computing / Software / System software

SEP.15 Terence Parr, University of San Francisco AN INTRODUCTION TO ANTLR AND DOMAIN-SPECIFIC LANGUAGES Most people think of grammars and parser generators in terms of building compilers, yet the number of language reco

Add to Reading List

Source URL: www.cs.sonoma.edu

Language: English - Date: 2006-10-15 16:23:22
279Systrace / Computer security / Unix / Kernel / System call / Operating system / Principle of least privilege / Microkernel / Chroot / System software / Software / Computer architecture

Improving Host Security with System Call Policies Niels Provos Center for Information Technology Integration University of Michigan [removed] Abstract

Add to Reading List

Source URL: niels.xtdnet.nl

Language: English - Date: 2003-08-09 20:58:49
280Cross-platform software / Sandbox / Mandatory access control / Ring / Operating system / R / Kernel / Debian / Linux / Software / System software / Computing

The RAppArmor Package: Enforcing Security Policies in R Using Dynamic Sandboxing on Linux Jeroen Ooms UCLA Department of Statistics Abstract

Add to Reading List

Source URL: cran.r-project.org

Language: English - Date: 2014-07-02 10:16:11
UPDATE