Designing and Leveraging Trustworthy Provenance-Aware Architectures

AM Bates - 2016 - search.proquest.com
In a provenance-aware system, mechanisms gather and report metadata that describes the
history of each object being processed on the system, allowing users to understand how …

Security identifier randomization: a method to prevent kernel privilege-escalation attacks

L Wei, Y Zuo, Y Ding, P Dong… - 2016 30th …, 2016 - ieeexplore.ieee.org
Privilege escalation attack is one of the serious threats to Linux. So the protection of the root
user is an important requirement for Linux systems and SELinux has tackled this issue in …