The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we advocate the use of code polymorphism as an efficient means to improve security at several levels in electronic devices. We analyse the threats that polymorphism could help thwart, and present the solution that we plan to demonstrate in the scope of a collaborative research project called COGITO. We expect our solution to be effective to improve security, to comply with the computing...
In presence of known and unknown vulnerabilities in code and flow control of programs, virtual machine alike isolation and sandboxing to confine maliciousness of process, by monitoring and controlling the behaviour of untrusted application, is an effective strategy. A confined malicious application cannot effect system resources and other applications running on same operating system. But present...
Traditional PC based operating systems load most of its components during the boot process along with the kernel. This mechanism though effective for a broader objective, is seldom utilized fully by a majority of users as they usually perform a specific job which does not require every component of OS. It has been observed that operating systems which are designed keeping in mind the nature of job,...
Leveraging developed root kit, malware could deeply hide its own process and hardly be detected. Based on analyzing various existing detecting technologies, a novel approach for hidden process detection was proposed in this paper. The approach used page table entry patching to traverse physical memory and obtain the raw data, and formulated the characteristic selection constraints to extract reliable...
With the rapid development of Internet and Cloud Computing, Web-based applications become more powerful. In order to fully use the Web-based applications, we design a new Operating System known as the Cloud Terminal Operating System. CTOS just runs one application which is Web browser, and the Web-based applications meet all the daily needs of users. CTOS abandons the traditional desktop applications,...
Often, an integrated mixed-criticality system is built in an environment which provides separation functionality for available on-board resources. In this paper we treat such an environment: the PikeOS separation kernel -- a commercial real-time embedded operating system. PikeOS allows applications with different safety and security levels to run on the same hardware. Obviously, a mixed-criticality...
A hypervisor consolidates multiple numbers and multiple types of OSes into a single machine by multiplexing a real machine into a number of virtual machines (VMs). An example the typical application of a hypervisor is server consolidation which uses the same or similar types of VMs and OSes (symmetric). Another application is accommodating different types of OSes (asymmetric): open platform and closed...
Cloud service providers (CSPs) should institute the necessary security controls, including restricting physical and logical access to hyper visor and other forms of employed virtualization layers. To enact relevant security measures, the core elements communicating with the hyper visor need to be secured. A proposed security model will introduce some of the aspects that need to be secured in the virtual...
A security kernel is that part of operating system software responsible for controlling access to files and other resources. This report gives a paradigm for showing that a kernel can protect itself from destruction or tampering by user software, on the basis of the hardware and kernel software properties. An illustrative proof is carried out for DEC PDP-11 /70 hardware, with kernel properties that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.