A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Verifying the Reliability of Operating System-Level Information Flow Control Systems in Linux
2017
2017 IEEE/ACM 5th International FME Workshop on Formal Methods in Software Engineering (FormaliSE)
Information Flow Control at Operating System (OS) level features interesting properties and have been an active topic of research for years. ...
However, previous works on the verification of LSM only addressed access control and no work has raised the question of the reliability of information flow control systems built on LSM. ...
We define an explicit information flow as the copy, usually partial, of the content of one container of information to another. The scope of this paper is the IFC at the Operating System (OS) level. ...
doi:10.1109/formalise.2017.1
dblp:conf/icse/GeorgetJTPT17
fatcat:on4xb736tbc37gikyyf3hldgna
Kernel Based Process Level Authentication Framework for Secure Computing and High Level System Assurance
English
2014
International Journal of Innovative Research in Computer and Communication Engineering
English
ABSTRACTIn modern operating system kernels level security is not present and a well-known approach to protecting systems from malicious activity is through the deployment of Mandatory Access Control (MAC ...
It verified the identity of processes before completing the requested System calls. ...
System Flow Diagram
VI. SCOPE OF WORK Proposed concept can be used in Linux kernel to do a process level authentication for every process before executing it. ...
doi:10.15680/ijircce.2014.0212045
fatcat:k3ehxiyk6jhsxnsvl6mdwmbzie
Consistency analysis of authorization hook placement in the Linux security modules framework
2004
ACM Transactions on Privacy and Security
We present a consistency analysis approach to assist the Linux community in verifying the correctness of authorization hook placement in the Linux Security Modules (LSM) framework. ...
The LSM framework consists of a set of authorization hooks inserted into the Linux kernel to enable additional authorizations to be performed (e.g., for mandatory access control). ...
Classifications are defined by consistency levels. For the system call level, all the controlled operations of a system call are in one class. ...
doi:10.1145/996943.996944
fatcat:ndhj7ttitbhpze5esrkwg6htim
Verifying compiled file system code
2011
Formal Aspects of Computing
Our results show that the SOCA Verifier is capable of analysing the complex Linux VFS implementation reliably and efficiently, thereby going beyond traditional testing tools and into niches that current ...
This testifies to the SOCA Verifier's suitability as an effective and efficient bug-finding tool during the development of operating system components. ...
Siminiceanu for their contributions to our previous work on the Linux VFS, and Jim Woodcock and Daniel Kroening for their insightful comments made during the examination of the first author's PhD thesis ...
doi:10.1007/s00165-011-0198-z
fatcat:3havzmt3ojdlfauze4u337ivta
Design and Realization of Modbus Protocol Based on Embedded Linux System
2008
2008 International Conference on Embedded Software and Systems Symposia
the Linux environment is designed in this paper. ...
The Modbus master realized by this embedded platform is stable and reliable. It has excellent prospect in the embedded data acquisition monitoring system of new automation applications. ...
Acknowledgements This work was supported in part by Shanghai Tackling Key Scientific and Technological Project (No. 061111004), Shanghai Dawn Tracking Project (No. 06GG13) and Shanghai Leading Academic ...
doi:10.1109/icess.symposia.2008.32
fatcat:mxmlrbphkjfjzppgmytzrwsgwy
QoSOS: An Adaptable Architecture for QoS Provisioning in Network Operating Systems
2003
Journal of Communication and Information Systems
the output queues of the Linux operating system. ...
Pmticularly, operating systems, despite their location at end systems, switches or routers, must guarantee that resources under their control are adequately managed to fulfill the application requirements ...
It consists of the following test: the sum of the r parameters of the current admitted controlled load flows with the r parameter informed in the traffic characterization of the solicitant cannot exceed ...
doi:10.14209/jcis.2003.22
fatcat:vb6paqgns5e5nct2nq6nxkzfeq
Ensuring operating system kernel integrity with OSck
2011
Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems - ASPLOS '11
OSck integrates and extends existing techniques for detecting rootkits, and verifies safety properties for large portions of the kernel heap with minimal overhead. ...
We deduce type information for verification by analyzing unmodified kernel source code and in-memory kernel data structures. ...
Acknowledgments We thank our shepherd, Mendel Rosenblum, as well as the anonymous reviewers for their comments on earlier versions of this paper. ...
doi:10.1145/1950365.1950398
dblp:conf/asplos/HofmannDKRW11
fatcat:ryli3rxqifh2tk5do3dpc7guzi
Ensuring operating system kernel integrity with OSck
2012
SIGPLAN notices
OSck integrates and extends existing techniques for detecting rootkits, and verifies safety properties for large portions of the kernel heap with minimal overhead. ...
We deduce type information for verification by analyzing unmodified kernel source code and in-memory kernel data structures. ...
Acknowledgments We thank our shepherd, Mendel Rosenblum, as well as the anonymous reviewers for their comments on earlier versions of this paper. ...
doi:10.1145/2248487.1950398
fatcat:pbztgiue6vc67gx3jdrinc7njy
Ensuring operating system kernel integrity with OSck
2011
SIGPLAN notices
OSck integrates and extends existing techniques for detecting rootkits, and verifies safety properties for large portions of the kernel heap with minimal overhead. ...
We deduce type information for verification by analyzing unmodified kernel source code and in-memory kernel data structures. ...
Acknowledgments We thank our shepherd, Mendel Rosenblum, as well as the anonymous reviewers for their comments on earlier versions of this paper. ...
doi:10.1145/1961296.1950398
fatcat:spl2uk2z4ngzpa2qf3hf34ifgy
Ensuring operating system kernel integrity with OSck
2011
SIGARCH Computer Architecture News
OSck integrates and extends existing techniques for detecting rootkits, and verifies safety properties for large portions of the kernel heap with minimal overhead. ...
We deduce type information for verification by analyzing unmodified kernel source code and in-memory kernel data structures. ...
Acknowledgments We thank our shepherd, Mendel Rosenblum, as well as the anonymous reviewers for their comments on earlier versions of this paper. ...
doi:10.1145/1961295.1950398
fatcat:l272jah6wfb3hpk5ppazulnzky
A Trusted Architecture for ESCS with MLS
2008
2008 International Conference on Embedded Software and Systems Symposia
These approaches lead to inflexible, overly complex operating systems that are too large to evaluate at the higher assurance levels. ...
The proposed framework supports multi-levels security (MLS), based on the principle of creating separate layers of responsibility and control, with each layer responsible for enforcing its own security ...
Acknowledgment This work is supported by the Youth Foundation of University of Electronic Science and Technology of China. ...
doi:10.1109/icess.symposia.2008.66
fatcat:rtcc4jfgzncnlpbja6uc2b2sqm
COTS-Based Architectural Framework for Reliable Real-Time Control Applications in Manufacturing
2020
Applied Sciences
This research attempts to tackle issues such as the reliability and efficiency of real-time control systems and advance further the current state-of-the-art. ...
The challenge of keeping the development and implementation of real-time control systems reliable and efficient and at the same time, low-cost and low-energy, is getting harder. ...
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/app10093228
fatcat:t7yjnbtx5fdmvmwxbxexdnsnh4
Operating System Security
2008
Synthesis Lectures on Information Security Privacy and Trust
Christoph Schuba has studied mathematics and management information systems at the University of Heidelberg and the University of Mannheim in Germany. ...
Trent has made a variety of contributions to open source systems security, particularly to the Linux Security Modules framework, the SELinux module and policy development, integrity measurement in Linux ...
In the Biba model, information flows are only allowed from the higher integrity levels to the lower integrity levels. ...
doi:10.2200/s00126ed1v01y200808spt001
fatcat:o7qgtis6zffr3disdujoq4izaa
From multilevel security to multiple independent levels of security/safety: the evolution illustrated through a novel cross-domain architecture
2017
International Journal of Mobile Network Design and Innovation
The requirement to protect information characterised by a hierarchy of sensitivity levels led to the definition of multilevel security. ...
Multilevel security represents one of the toughest problems that security engineers are still facing, due to the fact that it is difficult to manage securely information at different classification levels ...
Acknowledgements The author would like to thank SIRA s.r.l. that provided the technical equipment to develop the solution. ...
doi:10.1504/ijmndi.2017.082802
fatcat:jihunjqyr5fotmvsymol4j5u3e
Detecting Stack Layout Corruptions with Robust Stack Unwinding
[chapter]
2016
Lecture Notes in Computer Science
The stack is a critical memory structure to ensure the correct execution of programs because control flow changes through the data stored in it, such as return addresses and function pointers. ...
We present a novel system to detect the corruption of the stack layout using a robust stack unwinding technique and detailed stack layouts extracted from the stack unwinding information for exception handling ...
Yangchun Fu and Zhiqiang Lin were supported in part by the AFOSR grant no. FA9550-14-1-0173 and the NSF award no. 1453011. ...
doi:10.1007/978-3-319-45719-2_4
fatcat:o4yjnelprfdkjahfhdzfdwv4dm
« Previous
Showing results 1 — 15 out of 13,994 results