Sciweavers

2726 search results - page 33 / 546
» Application security support in the operating system kernel
Sort
View
IEEEARES
2009
IEEE
15 years 11 months ago
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring
—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
148
Voted
PLDI
2009
ACM
15 years 11 months ago
Laminar: practical fine-grained decentralized information flow control
Decentralized information flow control (DIFC) is a promising model for writing programs with powerful, end-to-end security guarantees. Current DIFC systems that run on commodity ...
Indrajit Roy, Donald E. Porter, Michael D. Bond, K...
GECCO
2007
Springer
184views Optimization» more  GECCO 2007»
15 years 8 months ago
Evolving kernels for support vector machine classification
While support vector machines (SVMs) have shown great promise in supervised classification problems, researchers have had to rely on expert domain knowledge when choosing the SVM&...
Keith Sullivan, Sean Luke
128
Voted
ACSAC
2001
IEEE
15 years 8 months ago
A Framework for Multiple Authorization Types in a Healthcare Application System
In most of the current authorization frameworks in application systems, the authorization for a user operation is determined using a static database like ACL entries or system tab...
Ramaswamy Chandramouli
USENIX
2003
15 years 6 months ago
Operating System Support for Virtual Machines
Abstract: A virtual-machine monitor (VMM) is a useful technique for adding functionality below existing operating system and application software. One class of VMMs (called Type II...
Samuel T. King, George W. Dunlap, Peter M. Chen