Security kernel

Results: 400



#Item
21Linux distributions / Red Hat / Linux kernel / Red Hat Enterprise Linux / Kernel / Linux

EXPLOITING THE LINUX KERNEL: MEASURES AND COUNTERMEASURES JON OBERHEIDE DUO SECURITY

Add to Reading List

Source URL: jon.oberheide.org

Language: English - Date: 2015-10-11 18:23:50
22Computer network security / Cyberwarfare / Computing platforms / NetBSD / Kerberos / Kernel / Firewall / HP-UX / Linux / Computer security / Unix / Pkgsrc

Roland Dowdeswell Address elided for online version Phone elided for online version Positions Director, Dowdeswell Security Architecture, Ltd

Add to Reading List

Source URL: www.imrryr.org

Language: English - Date: 2013-08-15 06:56:10
23Memory management / Instruction set architectures / Memory protection / Capability-based security / Kernel / Memory management unit / MIPS instruction set / Protection ring / Microkernel / EROS / Virtual memory / 64-bit computing

PDF Document

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:58
24Instruction set architectures / Central processing unit / Computer architecture / Memory management / Memory protection / Capability-based security / Pointer / MIPS instruction set / 64-bit computing / Instruction set / Reduced instruction set computing / Kernel

Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2015-12-01 06:21:41
25

How to use the Firefox, Google browser Our camera built-in OCX control is based on Microsoft IE kernel ActiveX control, can only be used for the core IE browser, can not be used in Mozilla Firefox, Google chrome browser

Add to Reading List

Source URL: www.lowcost-security.ch

- Date: 2015-02-11 08:43:50
    26Computer network security / Cyberwarfare / Denial-of-service attacks / Netfilter / Iptables / SYN cookies / Transmission Control Protocol / Denial-of-service attack / Tc / Firewall / SYN flood / Stateful firewall

    DDoS protection Using Netfilter/iptables Jesper Dangaard Brouer Senior Kernel Engineer, Red Hat Network-Services-Team

    Add to Reading List

    Source URL: people.netfilter.org

    Language: English - Date: 2014-02-08 09:46:20
    27Virtualization / Kernel

    Fine-Grained User-Space Security Through Virtualization Mathias Payer and Thomas R. Gross ETH Zurich Motivation

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    28Computer architecture / Computer security / System software / Trusted computing / Operating system kernels / Boot loaders / Cryptographic software / Trusted Platform Module / Trusted Execution Technology / Trusted Computing Group / Loadable kernel module / Loader

    Analysis of a Measured Launch

    Add to Reading List

    Source URL: evenmere.org

    Language: English - Date: 2008-06-23 13:59:25
    29Software / Computing / Memory management / Binary translation / System call / Call stack / Just-in-time compilation / Ioctl / Kernel / Self-modifying code / DynamoRIO / Subroutine

    Fine-Grained User-Space Security Through Virtualization Mathias Payer Thomas R. Gross

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    30Software / System software / Computer architecture / Virtual memory / Memory management / Data compression / Data deduplication / Data management / Kernel same-page merging / X86-64 / Covert channel / Kernel

    Security Implications of Memory Deduplication in a Virtualized Environment Jidong Xiao∗ , Zhang Xu∗ , Hai Huang† , Haining Wang∗ ∗ The † IBM

    Add to Reading List

    Source URL: www.cs.wm.edu

    Language: English - Date: 2013-05-30 14:58:15
    UPDATE