Filters








13,994 Hits in 7.7 sec

Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux

Laurent Georget, Mathieu Jaume, Frederic Tronel, Guillaume Piolle, Valerie Viet Triem Tong
2017 2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software Engineering (FormaliSE)  
Information Flow Control at Operating System (OS) level features interesting properties and have been an active topic of research for years.  ...  However, previous works on the verification of LSM only addressed access control and no work has raised the question of the reliability of information flow control systems built on LSM.  ...  We define an explicit information flow as the copy, usually partial, of the content of one container of information to another. The scope of this paper is the IFC at the Operating System (OS) level.  ... 
doi:10.1109/formalise.2017.1 dblp:conf/icse/GeorgetJTPT17 fatcat:on4xb736tbc37gikyyf3hldgna

Kernel Based Process Level Authentication Framework for Secure Computing and High Level System Assurance
English

Pradnya Patil, Shubham Joshi
2014 International Journal of Innovative Research in Computer and Communication Engineering  
ABSTRACTIn modern operating system kernels level security is not present and a well-known approach to protecting systems from malicious activity is through the deployment of Mandatory Access Control (MAC  ...  It verified the identity of processes before completing the requested System calls.  ...  System Flow Diagram VI. SCOPE OF WORK Proposed concept can be used in Linux kernel to do a process level authentication for every process before executing it.  ... 
doi:10.15680/ijircce.2014.0212045 fatcat:k3ehxiyk6jhsxnsvl6mdwmbzie

Consistency analysis of authorization hook placement in the Linux security modules framework

Trent Jaeger, Antony Edwards, Xiaolan Zhang
2004 ACM Transactions on Privacy and Security  
We present a consistency analysis approach to assist the Linux community in verifying the correctness of authorization hook placement in the Linux Security Modules (LSM) framework.  ...  The LSM framework consists of a set of authorization hooks inserted into the Linux kernel to enable additional authorizations to be performed (e.g., for mandatory access control).  ...  Classifications are defined by consistency levels. For the system call level, all the controlled operations of a system call are in one class.  ... 
doi:10.1145/996943.996944 fatcat:ndhj7ttitbhpze5esrkwg6htim

Verifying compiled file system code

Jan Tobias Mühlberg, Gerald Lüttgen
2011 Formal Aspects of Computing  
Our results show that the SOCA Verifier is capable of analysing the complex Linux VFS implementation reliably and efficiently, thereby going beyond traditional testing tools and into niches that current  ...  This testifies to the SOCA Verifier's suitability as an effective and efficient bug-finding tool during the development of operating system components.  ...  Siminiceanu for their contributions to our previous work on the Linux VFS, and Jim Woodcock and Daniel Kroening for their insightful comments made during the examination of the first author's PhD thesis  ... 
doi:10.1007/s00165-011-0198-z fatcat:3havzmt3ojdlfauze4u337ivta

Design and Realization of Modbus Protocol Based on Embedded Linux System

Dao-gang Peng, Hao Zhang, Li Yang, Hui Li
2008 2008 International Conference on Embedded Software and Systems Symposia  
the Linux environment is designed in this paper.  ...  The Modbus master realized by this embedded platform is stable and reliable. It has excellent prospect in the embedded data acquisition monitoring system of new automation applications.  ...  Acknowledgements This work was supported in part by Shanghai Tackling Key Scientific and Technological Project (No. 061111004), Shanghai Dawn Tracking Project (No. 06GG13) and Shanghai Leading Academic  ... 
doi:10.1109/icess.symposia.2008.32 fatcat:mxmlrbphkjfjzppgmytzrwsgwy

QoSOS: An Adaptable Architecture for QoS Provisioning in Network Operating Systems

Marcelo F. Moreno, Carlos S. Soares Neto, Antônio Tadeu A. Gomes, Sérgio Colcher, Luiz Fernando G. Soares
2003 Journal of Communication and Information Systems  
the output queues of the Linux operating system.  ...  Pmticularly, operating systems, despite their location at end systems, switches or routers, must guarantee that resources under their control are adequately managed to fulfill the application requirements  ...  It consists of the following test: the sum of the r parameters of the current admitted controlled load flows with the r parameter informed in the traffic characterization of the solicitant cannot exceed  ... 
doi:10.14209/jcis.2003.22 fatcat:vb6paqgns5e5nct2nq6nxkzfeq

Ensuring operating system kernel integrity with OSck

Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indrajit Roy, Emmett Witchel
2011 Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems - ASPLOS '11  
OSck integrates and extends existing techniques for detecting rootkits, and verifies safety properties for large portions of the kernel heap with minimal overhead.  ...  We deduce type information for verification by analyzing unmodified kernel source code and in-memory kernel data structures.  ...  Acknowledgments We thank our shepherd, Mendel Rosenblum, as well as the anonymous reviewers for their comments on earlier versions of this paper.  ... 
doi:10.1145/1950365.1950398 dblp:conf/asplos/HofmannDKRW11 fatcat:ryli3rxqifh2tk5do3dpc7guzi

Ensuring operating system kernel integrity with OSck

Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indrajit Roy, Emmett Witchel
2012 SIGPLAN notices  
OSck integrates and extends existing techniques for detecting rootkits, and verifies safety properties for large portions of the kernel heap with minimal overhead.  ...  We deduce type information for verification by analyzing unmodified kernel source code and in-memory kernel data structures.  ...  Acknowledgments We thank our shepherd, Mendel Rosenblum, as well as the anonymous reviewers for their comments on earlier versions of this paper.  ... 
doi:10.1145/2248487.1950398 fatcat:pbztgiue6vc67gx3jdrinc7njy

Ensuring operating system kernel integrity with OSck

Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indrajit Roy, Emmett Witchel
2011 SIGPLAN notices  
OSck integrates and extends existing techniques for detecting rootkits, and verifies safety properties for large portions of the kernel heap with minimal overhead.  ...  We deduce type information for verification by analyzing unmodified kernel source code and in-memory kernel data structures.  ...  Acknowledgments We thank our shepherd, Mendel Rosenblum, as well as the anonymous reviewers for their comments on earlier versions of this paper.  ... 
doi:10.1145/1961296.1950398 fatcat:spl2uk2z4ngzpa2qf3hf34ifgy

Ensuring operating system kernel integrity with OSck

Owen S. Hofmann, Alan M. Dunn, Sangman Kim, Indrajit Roy, Emmett Witchel
2011 SIGARCH Computer Architecture News  
OSck integrates and extends existing techniques for detecting rootkits, and verifies safety properties for large portions of the kernel heap with minimal overhead.  ...  We deduce type information for verification by analyzing unmodified kernel source code and in-memory kernel data structures.  ...  Acknowledgments We thank our shepherd, Mendel Rosenblum, as well as the anonymous reviewers for their comments on earlier versions of this paper.  ... 
doi:10.1145/1961295.1950398 fatcat:l272jah6wfb3hpk5ppazulnzky

A Trusted Architecture for ESCS with MLS

Xia Yang, Xiangyu Zhao, Jian Lei, Guangze Xiong
2008 2008 International Conference on Embedded Software and Systems Symposia  
These approaches lead to inflexible, overly complex operating systems that are too large to evaluate at the higher assurance levels.  ...  The proposed framework supports multi-levels security (MLS), based on the principle of creating separate layers of responsibility and control, with each layer responsible for enforcing its own security  ...  Acknowledgment This work is supported by the Youth Foundation of University of Electronic Science and Technology of China.  ... 
doi:10.1109/icess.symposia.2008.66 fatcat:rtcc4jfgzncnlpbja6uc2b2sqm

COTS-Based Architectural Framework for Reliable Real-Time Control Applications in Manufacturing

George K. Adam, Nikos Petrellis, Georgia Garani, Tilemachos Stylianos
2020 Applied Sciences  
This research attempts to tackle issues such as the reliability and efficiency of real-time control systems and advance further the current state-of-the-art.  ...  The challenge of keeping the development and implementation of real-time control systems reliable and efficient and at the same time, low-cost and low-energy, is getting harder.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app10093228 fatcat:t7yjnbtx5fdmvmwxbxexdnsnh4

Operating System Security

Trent Jaeger
2008 Synthesis Lectures on Information Security Privacy and Trust  
Christoph Schuba has studied mathematics and management information systems at the University of Heidelberg and the University of Mannheim in Germany.  ...  Trent has made a variety of contributions to open source systems security, particularly to the Linux Security Modules framework, the SELinux module and policy development, integrity measurement in Linux  ...  In the Biba model, information flows are only allowed from the higher integrity levels to the lower integrity levels.  ... 
doi:10.2200/s00126ed1v01y200808spt001 fatcat:o7qgtis6zffr3disdujoq4izaa

From multilevel security to multiple independent levels of security/safety: the evolution illustrated through a novel cross-domain architecture

Angelo Liguori
2017 International Journal of Mobile Network Design and Innovation  
The requirement to protect information characterised by a hierarchy of sensitivity levels led to the definition of multilevel security.  ...  Multilevel security represents one of the toughest problems that security engineers are still facing, due to the fact that it is difficult to manage securely information at different classification levels  ...  Acknowledgements The author would like to thank SIRA s.r.l. that provided the technical equipment to develop the solution.  ... 
doi:10.1504/ijmndi.2017.082802 fatcat:jihunjqyr5fotmvsymol4j5u3e

Detecting Stack Layout Corruptions with Robust Stack Unwinding [chapter]

Yangchun Fu, Junghwan Rhee, Zhiqiang Lin, Zhichun Li, Hui Zhang, Guofei Jiang
2016 Lecture Notes in Computer Science  
The stack is a critical memory structure to ensure the correct execution of programs because control flow changes through the data stored in it, such as return addresses and function pointers.  ...  We present a novel system to detect the corruption of the stack layout using a robust stack unwinding technique and detailed stack layouts extracted from the stack unwinding information for exception handling  ...  Yangchun Fu and Zhiqiang Lin were supported in part by the AFOSR grant no. FA9550-14-1-0173 and the NSF award no. 1453011.  ... 
doi:10.1007/978-3-319-45719-2_4 fatcat:o4yjnelprfdkjahfhdzfdwv4dm
« Previous Showing results 1 — 15 out of 13,994 results