Zobrazeno 1 - 10
of 78
pro vyhledávání: '"inotify"'
Autor:
Evgeny Novikov
Publikováno v:
Труды Института системного программирования РАН, Vol 29, Iss 2, Pp 77-96 (2018)
Existing research analyzing evolution of the Linux kernel considers the kernel together with loadable modules delivered with it or some specific subsystems of the kernel. The aim of this paper is to evaluate evolution of the kernel without loadable m
Publikováno v:
KIISE Transactions on Computing Practices. 24:157-164
Publikováno v:
IEEE Access, Vol 6, Pp 46213-46226 (2018)
Applications face additional latency when they launch or access a disk to load data into the memory. In this paper, a user-level disk prefetching framework, called iFetcher, is introduced to hide this delay in Linux-based operating systems. This empl
Publikováno v:
CLUSTER
Data automation, monitoring, and management tools are reliant on being able to detect, report, and respond to file system events. Various data event reporting tools exist for specific operating systems and storage devices, such as inotify for Linux,
Publikováno v:
IEICE Transactions on Information and Systems. :2404-2409
Autor:
Doug Abbott
This chapter discusses how to build a configurable kernel to match your own requirements.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cc0a1f3c467a02d3f67683e4b27d3c00
https://doi.org/10.1016/b978-0-12-811277-9.00012-2
https://doi.org/10.1016/b978-0-12-811277-9.00012-2
Publikováno v:
SPIN
Read-Copy-Update (RCU) is a synchronization mechanism used heavily in key components of the Linux kernel, such as the virtual filesystem (VFS), to achieve scalability by exploiting RCU's ability to allow concurrent reads and updates. RCU's design is
Publikováno v:
2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
Dirty Copy on Write (COW) vulnerability, discovered by Phil Oester on October 2016, it is a serious vulnerability which could escalate unprivileged user to gain full control on devices (Computers, Mobile Smart Phones, Gaming devices that run Linux ba
Autor:
Prabhaker Mateti, Sudip Hazra
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811068973
SSCC
SSCC
The field of Android forensics is evolving rapidly, with older forensic techniques becoming irrelevant within a short time. In this paper, we identify the challenges faced by the investigation agencies during examination of Android devices. We classi
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::b86eadc98fb865aa851c384fdbd480d9
https://doi.org/10.1007/978-981-10-6898-0_24
https://doi.org/10.1007/978-981-10-6898-0_24
Publikováno v:
Communications in Computer and Information Science ISBN: 9789811063848
ICPCSEE (1)
ICPCSEE (1)
The diversity of Linux versions brings challenges to Linux memory analysis, which is an established technique in security and forensic investigations. During memory forensics, kernel data structures are essential information. Existing solutions obtai
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bf48038cf8b9e6a51dab90f911af748a
https://doi.org/10.1007/978-981-10-6385-5_32
https://doi.org/10.1007/978-981-10-6385-5_32