Improving operating systems security: two case studies
Malicious attacks on computer systems attempt to obtain and maintain illicit control over the victim system. To obtain unauthorized access, they often exploit vulnerabilities in the victim system, and to maintain illicit control, they apply various hiding techniques to remain stealthy. In this dis...
Main Author: | Wei, Jinpeng |
---|---|
Published: |
Georgia Institute of Technology
2010
|
Subjects: | |
Online Access: | http://hdl.handle.net/1853/31849 |
Similar Items
-
MISSTEV : model for information security shared tacit espoused values
by: Thomson, Kerry-Lynn
Published: (2007) -
Provides a New Way to Enhance Security in the Linux Operating System
by: Hamid Reza Ganji, et al.
Published: (2018-11-01) -
Securing media streams in an Asterisk-based environment and evaluating the resulting performance cost
by: Clayton, Bradley
Published: (2007) -
FADE: secure overlay cloud storage with access control and file assured deletion.
Published: (2011) -
Design and evaluation of a secure, privacy-preserving and cancelable biometric authentication : Bio-Capsule
by: Sui, Yan
Published: (2014)