2 Hits in 5.1 sec

A decade of OS access-control extensibility

Robert N. M. Watson
2013 Communications of the ACM  
requirements, and finally reflects on the continuing evolution of operating-system security. to DisCUss oPeratiNg-sYsteM security is to marvel at the diversity of deployed access-control models: Unix and  ...  One such extensible kernel reference-monitor framework is the Trust-edBSD MAC (Mandatory Access Control) Framework, developed beginning in 2000 and shipped in the open source FreeBSD operating system in  ...  ACM CTO Roundtable on Mobile Devices in the Enterprise Mache Creeger  ... 
doi:10.1145/2408776.2408792 fatcat:bifeu3atibdb7gzq3jjzcz7cre

The Evolution of Android Malware and Android Analysis Techniques

Kimberly Tam, Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Lorenzo Cavallaro
2017 ACM Computing Surveys  
With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information.  ...  It is therefore essential to devise effective techniques to analyze and detect these threats.  ...  This helps determine their vulnerability to malware infections and malware exploits. iOS: Released in 2007, iOS (previously iPhone OS) runs on XNU, a hybrid kernel.  ... 
doi:10.1145/3017427 fatcat:f2vdpgntincgvd4xv52l2ovray