Recommendations for secure initialization routines in operating systems
Approved for public release; distribution in unlimited. === While a necessity of all operating systems, the code that initializes a system can be notoriously difficult to understand. This thesis explores the most common architectures used for bringing an operating system to its initial state, once t...
Main Author: | Dodge, Catherine A. |
---|---|
Other Authors: | Irvine, Cynthia E. |
Format: | Others |
Published: |
Monterey, California. Naval Postgraduate School
2012
|
Subjects: | |
Online Access: | http://hdl.handle.net/10945/1206 |
Similar Items
-
Using the bootstrap concept to build an adaptable and compact subversion artifice
by: Lack, Lindsey A.
Published: (June) -
Computer-Aided Sensor Development Focused on Security Issues
by: Andrzej Bialas
Published: (2016-05-01) -
How Can Secure Software be Trusted?
by: Lynn Futcher, et al.
Published: (2011-11-01) -
Ascertaining the Relationship between Security Awareness and the Security Behavior of Individuals
by: Grant, Gordon J.
Published: (2010) -
Security Critical Systems in Software
by: Frid, Jonas
Published: (2010)