Sciweavers

209 search results - page 2 / 42
» Ensuring operating system kernel integrity with OSck
Sort
View
ACSAC
2009
IEEE
14 years 2 months ago
Protecting Commodity Operating System Kernels from Vulnerable Device Drivers
Device drivers on commodity operating systems execute with kernel privilege and have unfettered access to kernel data structures. Several recent attacks demonstrate that such poor...
Shakeel Butt, Vinod Ganapathy, Michael M. Swift, C...
IRI
2008
IEEE
14 years 2 months ago
Eliminating the threat of kernel stack overflows
The Linux kernel stack has a fixed size. There is no mechanism to prevent the kernel from overflowing the stack. Hackers can exploit this bug to put unwanted information in the me...
Yair Wiseman, Joel Isaacson, Eliad Lubovsky
ACSAC
2009
IEEE
14 years 2 months ago
Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System
Abstract—The traditional virtual machine usage model advocates placing security mechanisms in a trusted VM layer and letting the untrusted guest OS run unaware of the presence of...
Daniela Alvim Seabra de Oliveira, Shyhtsun Felix W...
PRDC
1999
IEEE
14 years 7 hour ago
Cost of Ensuring Safety in Distributed Database Management Systems
Generally, applications employing Database Management Systems (DBMS) require that the integrity of the data stored in the database be preserved during normal operation as well as ...
Maitrayi Sabaratnam, Svein-Olaf Hvasshovd, Ø...
ICEIS
2002
IEEE
14 years 20 days ago
Integrating Mobile Agent Infrastructures in Operational ERP Systems
: In this paper we present our most recent work carried out in the wider context of the IST-ADRENALIN project, to facilitate formation and lifecycle management of networked enterpr...
Apostolos Vontas, Philippos Koutsakas, Christina A...