Security kernel

Results: 400



#Item
1Application Security Support in the Operating System Kernel Manigandan Radhakrishnan Jon A. Solworth

Application Security Support in the Operating System Kernel Manigandan Radhakrishnan Jon A. Solworth

Add to Reading List

Source URL: www.ethos-os.org

Language: English - Date: 2017-04-30 19:19:47
    2Release Notes i2b2 ReleaseRelease Date: May 14, 2018 Release Summary Releasecontains several new enhancements to the i2b2 kernel, many of which improve the security around signing into the i2b2 Web

    Release Notes i2b2 ReleaseRelease Date: May 14, 2018 Release Summary Releasecontains several new enhancements to the i2b2 kernel, many of which improve the security around signing into the i2b2 Web

    Add to Reading List

    Source URL: www.i2b2.org

    Language: English - Date: 2018-05-14 14:46:41
      3KTLS: Linux Kernel Transport Layer Security 1st Dave Watson Facebook San Francisco, USA

      KTLS: Linux Kernel Transport Layer Security 1st Dave Watson Facebook San Francisco, USA

      Add to Reading List

      Source URL: netdevconf.org

      - Date: 2016-12-12 09:57:21
        4Linux Kernel Security Update LinuxCon Europe Berlin, 2016 James Morris

        Linux Kernel Security Update LinuxCon Europe Berlin, 2016 James Morris

        Add to Reading List

        Source URL: namei.org

        - Date: 2016-10-05 10:56:47
          5Formal Verification of Information Flow Security for a Simple ARM-Based Separation Kernel Mads Dam, Roberto Guanciale, Narges Khakpour, Hamed Nemati KTH Royal Institute of Technology SE, Stockholm, Sweden

          Formal Verification of Information Flow Security for a Simple ARM-Based Separation Kernel Mads Dam, Roberto Guanciale, Narges Khakpour, Hamed Nemati KTH Royal Institute of Technology SE, Stockholm, Sweden

          Add to Reading List

          Source URL: prosper.sics.se

          - Date: 2013-10-17 09:26:32
            6SECURITY ADVISORY – “Dirty COW” Linux Kernel Vulnerability (CVEAdvisory Version 1.1 ______________________________________________________________________________________________________________________

            SECURITY ADVISORY – “Dirty COW” Linux Kernel Vulnerability (CVEAdvisory Version 1.1 ______________________________________________________________________________________________________________________

            Add to Reading List

            Source URL: supportdocs.polycom.com

            - Date: 2016-11-04 17:41:33
              7The Canonical Livepatch Service Apply critical kernel patches without rebooting The Canonical Livepatch Service enables you apply critical kernel security fixes to your UbuntuLTS system without rebooting. Availabl

              The Canonical Livepatch Service Apply critical kernel patches without rebooting The Canonical Livepatch Service enables you apply critical kernel security fixes to your UbuntuLTS system without rebooting. Availabl

              Add to Reading List

              Source URL: pages.ubuntu.com

              - Date: 2016-12-10 08:11:23
                8Microsoft Word - Solaris Kernel Crytpo Framework Security Policy.doc

                Microsoft Word - Solaris Kernel Crytpo Framework Security Policy.doc

                Add to Reading List

                Source URL: csrc.nist.gov

                - Date: 2016-07-28 09:42:16
                  9QUADROOTER NEW VULNERABILITIES AFFECTING OVER 900 MILLION ANDROID DEVICES by the Check Point Research Team INTRODUCTION The cloak-and-dagger of cybercrime makes for entertaining theater.

                  QUADROOTER NEW VULNERABILITIES AFFECTING OVER 900 MILLION ANDROID DEVICES by the Check Point Research Team INTRODUCTION The cloak-and-dagger of cybercrime makes for entertaining theater.

                  Add to Reading List

                  Source URL: www.checkpoint.com

                  Language: English - Date: 2016-08-05 12:48:52
                  10Linux Kernel Exploitation Earning Its Pwnie a Vuln at a Time Jon Oberheide CTO, Scio Security  This document is confidential and is intended solely for use by its original recipient for informational

                  Linux Kernel Exploitation Earning Its Pwnie a Vuln at a Time Jon Oberheide CTO, Scio Security This document is confidential and is intended solely for use by its original recipient for informational

                  Add to Reading List

                  Source URL: jon.oberheide.org

                  Language: English - Date: 2015-10-11 18:23:38