Search
for Topics
All Reviews
Browse All Reviews
>
Software (D)
>
Operating Systems (D.4)
>
Security and Protection (D.4.6)
> Security Kernels (D.4.6...)
Options:
All Media Types
Journals
Proceedings
Div Books
Whole Books
Other
Date Reviewed
Title
Author
Publisher
Published Date
Descending
Ascending
1-3 of 3 Reviews about "
Security Kernels (D.4.6...)
":
Date Reviewed
A guide to kernel exploitation: attacking the core
Perla E., Oldani M., Syngress Publishing, Boston, MA, 2010. 442 pp. Type: Book (978-1-597494-86-1)
The authors of this book address a very specific and (until now) marginally covered topic in the area of software security: essentially, the writing of exploits that target the operating system (OS) itself....
Jun 8 2011
On the Identification of Covert Storage Channels in Secure Systems
Tsai C., Gligor V., Shandersekaran C. IEEE Transactions on Software Engineering 16(6): 569-580, 1990. Type: Article
A method of identifying covert storage channels in secure systems is based on analysis of source code. The method is illustrated with examples taken from an analysis of Secure Xenix....
Sep 1 1991
A new security testing method and its application to the Secure Xenix Kernel
Gligor V., Chandersekaran C., Jiang W., Johri A., Luckenbaugh G., Reich L. IEEE Transactions on Software Engineering SE-13(2): 169-183, 1987. Type: Article
This paper describes a set of principles and methods for validating, via testing, security properties of a security kernel. A basic objective is to reduce the number of tests needed by combining the advantages of “black-box&a...
Oct 1 1987
Reproduction in whole or in part without permission is prohibited. Copyright 1999-2024 ThinkLoud
®
Terms of Use
|
Privacy Policy