Modern client platforms, such as iOS, Android, Windows Phone, and Windows 8, have progressed from a per-user isolation policy, where users are isolated but a user's …
Isolating sensitive state and data can increase the security and robustness of many applications. Examples include protecting cryptographic keys against exploits like …
M Huth, F Nielson - Computing and Software Science: State of the Art and …, 2019 - Springer
We reflect on current problems and practices in system security, distinguishing between reactive security–which deals with vulnerabilities as they are being exploited–and proactive …
M Särelä, T Kyöstilä, T Kiravuo… - International Journal of …, 2017 - Wiley Online Library
Intrusion prevention systems have become a common security measure in the past 20 years. Their promise is the possibility to prevent known attacks against vulnerable, unpatched …
Lab. Its objective is to assess the state of the art of embedded management interfaces and develop more secure solutions. This white paper summarizes the result of the first part of our …
Comparative Analysis of Intrusion-Tolerant System Architectures Page 1 1 Comparative Analysis of Intrusion-Tolerant System Architectures Quyen L. Nguyen1 and Arun Sood1,2 …
H Lefeuvre, VA Bădoiu, Ş Teodorescu… - Proceedings of the …, 2021 - dl.acm.org
OS design is traditionally heavily intertwined with protection mechanisms. OSes statically commit to one or a combination of (1) hardware isolation,(2) runtime checking, and (3) …
Operating systems must be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide variety of real-world security policies. Such flexibility …
A Askarov, A Myers - Logical Methods in Computer Science, 2011 - lmcs.episciences.org
Language-based information flow methods offer a principled way to enforce strong security properties, but enforcing noninterference is too inflexible for realistic applications. Security …