PROTECTION OF OPERATING SYSTEMS AGAINST POSSIBLE THREATS

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Virtualization Based Password Protection against Malware in Untrusted Operating Systems

Password based authentication remains as the mainstream user authentication method for most web servers, despite its known vulnerability to keylogger attacks. Most existing countermeasures are costly because they require a strong isolation of the browser and the operating system. In this paper, we propose KGuard, a password input protection system. Its security is based on the hardware-based vi...

متن کامل

Garlic: nature's protection against physiological threats.

Currently reliance on natural products is gaining popularity to combat various physiological threats including oxidative stress, cardiovascular complexities, cancer insurgence, and immune dysfunction. The use of traditional remedies may encounter more frequently due to an array of scientific evidence in their favor. Garlic (Allium sativum) holds a unique position in history and was recognized f...

متن کامل

Survey: Data Protection in Smartphones Against Physical Threats

In this paper we present a survey of the data protection systems in the presence of physical threats, such as theft, loss, damage and malicious use. Recent studies suggests that the aforementioned threats are real and happen with very high rates, e.g., it has been reported that more than 50% of Maimi city had experience with theft and loss of their device in 2011. In this paper we also present ...

متن کامل

Temporal Protection in Real-Time Operating Systems

Real-time systems manipulate data types with inherent timing constraints. Priority-based scheduling is a popular approach to build hard real-time systems, when the timing requirements, supported run-time configurations, and task sets are known a priori. Future real-time systems would need to support these hard real-time constraints but in addition (a) provide friendly userinterfaces with audio ...

متن کامل

Efficient Intra-Operating System Protection Against Harmful DMAs

Operating systems can defend themselves against misbehaving I/O devices and drivers by employing intra-OS protection. With “strict” intra-OS protection, the OS uses the IOMMU to map each DMA buffer immediately before the DMA occurs and to unmap it immediately after. Strict protection is costly due to IOMMU-related hardware overheads, motivating “deferred” intra-OS protection, which trades off s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Proceedings of National Aviation University

سال: 2011

ISSN: 2306-1472,1813-1166

DOI: 10.18372/2306-1472.49.85