Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Operating Systems (D.4) > Security and Protection (D.4.6) > Security Kernels (D.4.6...)  
 
Options:
 
  1-3 of 3 Reviews about "Security Kernels (D.4.6...)": Date Reviewed
  A guide to kernel exploitation: attacking the core
Perla E., Oldani M., Syngress Publishing, Boston, MA, 2010. 442 pp.  Type: Book (978-1-597494-86-1)

The authors of this book address a very specific and (until now) marginally covered topic in the area of software security: essentially, the writing of exploits that target the operating system (OS) itself....

Jun 8 2011
  On the Identification of Covert Storage Channels in Secure Systems
Tsai C., Gligor V., Shandersekaran C. IEEE Transactions on Software Engineering 16(6): 569-580, 1990.  Type: Article

A method of identifying covert storage channels in secure systems is based on analysis of source code. The method is illustrated with examples taken from an analysis of Secure Xenix....

Sep 1 1991
  A new security testing method and its application to the Secure Xenix Kernel
Gligor V., Chandersekaran C., Jiang W., Johri A., Luckenbaugh G., Reich L. IEEE Transactions on Software Engineering SE-13(2): 169-183, 1987.  Type: Article

This paper describes a set of principles and methods for validating, via testing, security properties of a security kernel. A basic objective is to reduce the number of tests needed by combining the advantages of “black-box&a...

Oct 1 1987
 
 
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy