Zobrazeno 1 - 10
of 16
pro vyhledávání: '"Vijayakumar, Hayawardh"'
Filesystem vulnerabilities persist as a significant threat to Android systems, despite various proposed defenses and testing techniques. The complexity of program behaviors and access control mechanisms in Android systems makes it challenging to effe
Externí odkaz:
http://arxiv.org/abs/2407.11279
Autor:
Lee, Yu-Tsung, Chen, Haining, Enck, William, Vijayakumar, Hayawardh, Li, Ninghui, Qian, Zhiyun, Petracca, Giuseppe, Jaeger, Trent
Android's filesystem access control is a crucial aspect of its system integrity. It utilizes a combination of mandatory access controls, such as SELinux, and discretionary access controls, like Unix permissions, along with specialized access controls
Externí odkaz:
http://arxiv.org/abs/2302.13506
Autor:
Lee, Yu-Tsung, Enck, William, Chen, Haining, Vijayakumar, Hayawardh, Li, Ninghui, Wang, Daimeng, Qian, Zhiyun, Petracca, Giuseppe, Jaeger, Trent
Android filesystem access control provides a foundation for Android system integrity. Android utilizes a combination of mandatory (e.g., SEAndroid) and discretionary (e.g., UNIX permissions) access control, both to protect the Android platform from A
Externí odkaz:
http://arxiv.org/abs/2008.03593
Many smartphones now deploy conventional operating systems, so the rootkit attacks so prevalent on desktop and server systems are now a threat to smartphones. While researchers have advocated using virtualization to detect and prevent attacks on oper
Externí odkaz:
http://arxiv.org/abs/1410.7747
Publikováno v:
2015 IEEE 8th International Conference on Cloud Computing; 2015, p253-260, 8p
Autor:
Jaeger, Trent, Ge, Xinyang, Muthukumaran, Divya, Rueda, Sandra, Schiffman, Joshua, Vijayakumar, Hayawardh
Publikováno v:
Transactions on Edutainment XI; 2015, p55-74, 20p
Publikováno v:
2013 IEEE Ninth World Congress on Services; 2013, p239-246, 8p
Autor:
Vijayakumar, Hayawardh, Jaeger, Trent
Publikováno v:
Automated Security Management; 2013, p119-133, 15p
Autor:
Muthukumaran, Divya, Rueda, Sandra, Talele, Nirupama, Vijayakumar, Hayawardh, Teutsch, Jason, Jaeger, Trent
Publikováno v:
Proceedings of the 28th Annual Computer Security Applications Conference; 12/3/2012, p269-278, 10p
Publikováno v:
Trust & Trustworthy Computing (9783642309205); 2012, p179-200, 22p