Zobrazeno 1 - 10
of 127
pro vyhledávání: '"procfs"'
Autor:
Daniele Ucci, Leonardo Querzoni, Leonardo Aniello, Luca Massarelli, Roberto Baldoni, Claudio Ciccotelli
Publikováno v:
Information, Vol 11, Iss 326, p 326 (2020)
Information
Volume 11
Issue 6
Information
Volume 11
Issue 6
The vast majority of today&rsquo
s mobile malware targets Android devices. An important task of malware analysis is the classification of malicious samples into known families. In this paper, we propose AndroDFA (DFA, detrended fluctuation analy
s mobile malware targets Android devices. An important task of malware analysis is the classification of malicious samples into known families. In this paper, we propose AndroDFA (DFA, detrended fluctuation analy
Autor:
Evgeny Novikov
Publikováno v:
Труды Института системного программирования РАН, Vol 29, Iss 2, Pp 77-96 (2018)
Existing research analyzing evolution of the Linux kernel considers the kernel together with loadable modules delivered with it or some specific subsystems of the kernel. The aim of this paper is to evaluate evolution of the kernel without loadable m
Autor:
Hassan Jamil Syed, Muhammad Khurram Khan, Abdullah Gani, Fariza Hanum Nasaruddin, Abdelmuttlib Ibrahim Abdalla Ahmed, Anjum Naveed
Publikováno v:
IEEE Access, Vol 6, Pp 44591-44606 (2018)
Cloud computing has seen massive growth in this decade. With the rapid development of cloud networks, cloud monitoring has become essential for running cloud systems smoothly. Cloud monitoring collects monitoring metrics from the cloud’s physical a
Autor:
Mojtaba Bagherzadeh, James R. Cordy, Nafiseh Kahani, Ahmed Hassan, Cor-Paul Bezemer, Juergen Dingel
Publikováno v:
ICSE
The Linux kernel provides its services to the application layer using so-called system calls. All system calls combined form the Application Programming Interface (API) of the kernel. Hence, system calls provide us with a window into the development
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 13:568-581
VM-based inspection tools generally implement probes in the hypervisor to monitor events and the state of kernel of the guest system. The most important function of a probe is to carve information of interest out of the memory of the guest when it is
Publikováno v:
Simon, L, Xu, W & Anderson, R 2016, ' Don’t Interrupt Me While I Type: Inferring Text Entered Through Gesture Typing on Android Keyboards ', Proceedings on Privacy Enhancing Technologies, vol. 2016, no. 3, pp. 136-154 . https://doi.org/10.1515/popets-2016-0020
Proceedings on Privacy Enhancing Technologies, Vol 2016, Iss 3, Pp 136-154 (2016)
Proceedings on Privacy Enhancing Technologies, Vol 2016, Iss 3, Pp 136-154 (2016)
We present a new side-channel attack against soft keyboards that support gesture typing on Android smartphones. An application without any special permissions can observe the number and timing of the screen hardware interrupts and system-wide softwar
Autor:
Xueyang Wang, Ramesh Karri
Publikováno v:
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems. 35:485-498
Kernel rootkits are formidable threats to computer systems. They are stealthy and can have unrestricted access to system resources. This paper presents NumChecker, a new virtual machine (VM) monitor based framework to detect and identify control-flow
Autor:
Doug Abbott
This chapter discusses how to build a configurable kernel to match your own requirements.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cc0a1f3c467a02d3f67683e4b27d3c00
https://doi.org/10.1016/b978-0-12-811277-9.00012-2
https://doi.org/10.1016/b978-0-12-811277-9.00012-2
Publikováno v:
NDSS
Autor:
Arvind Krishnamurthy, Jialin Li, Thomas Anderson, Irene Zhang, Timothy Roscoe, Dan R. K. Ports, Doug Woos, Simon Peter
Publikováno v:
ACM Transactions on Computer Systems. 33:1-30
Recent device hardware trends enable a new approach to the design of network server operating systems. In a traditional operating system, the kernel mediates access to device hardware by server applications to enforce process isolation as well as net