A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
A decade of OS access-control extensibility
2013
Communications of the ACM
requirements, and finally reflects on the continuing evolution of operating-system security. to DisCUss oPeratiNg-sYsteM security is to marvel at the diversity of deployed access-control models: Unix and ...
One such extensible kernel reference-monitor framework is the Trust-edBSD MAC (Mandatory Access Control) Framework, developed beginning in 2000 and shipped in the open source FreeBSD operating system in ...
ACM CTO Roundtable on Mobile Devices in the Enterprise Mache Creeger http://queue.acm.org/detail.cfm?id=2016038 ...
doi:10.1145/2408776.2408792
fatcat:bifeu3atibdb7gzq3jjzcz7cre
The Evolution of Android Malware and Android Analysis Techniques
2017
ACM Computing Surveys
With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. ...
It is therefore essential to devise effective techniques to analyze and detect these threats. ...
This helps determine their vulnerability to malware infections and malware exploits. iOS: Released in 2007, iOS (previously iPhone OS) runs on XNU, a hybrid kernel. ...
doi:10.1145/3017427
fatcat:f2vdpgntincgvd4xv52l2ovray