PROTECTION OF OPERATING SYSTEMS AGAINST POSSIBLE THREATS
نویسندگان
چکیده
منابع مشابه
Virtualization Based Password Protection against Malware in Untrusted Operating Systems
Password based authentication remains as the mainstream user authentication method for most web servers, despite its known vulnerability to keylogger attacks. Most existing countermeasures are costly because they require a strong isolation of the browser and the operating system. In this paper, we propose KGuard, a password input protection system. Its security is based on the hardware-based vi...
متن کاملGarlic: nature's protection against physiological threats.
Currently reliance on natural products is gaining popularity to combat various physiological threats including oxidative stress, cardiovascular complexities, cancer insurgence, and immune dysfunction. The use of traditional remedies may encounter more frequently due to an array of scientific evidence in their favor. Garlic (Allium sativum) holds a unique position in history and was recognized f...
متن کاملSurvey: Data Protection in Smartphones Against Physical Threats
In this paper we present a survey of the data protection systems in the presence of physical threats, such as theft, loss, damage and malicious use. Recent studies suggests that the aforementioned threats are real and happen with very high rates, e.g., it has been reported that more than 50% of Maimi city had experience with theft and loss of their device in 2011. In this paper we also present ...
متن کاملTemporal Protection in Real-Time Operating Systems
Real-time systems manipulate data types with inherent timing constraints. Priority-based scheduling is a popular approach to build hard real-time systems, when the timing requirements, supported run-time configurations, and task sets are known a priori. Future real-time systems would need to support these hard real-time constraints but in addition (a) provide friendly userinterfaces with audio ...
متن کاملEfficient Intra-Operating System Protection Against Harmful DMAs
Operating systems can defend themselves against misbehaving I/O devices and drivers by employing intra-OS protection. With “strict” intra-OS protection, the OS uses the IOMMU to map each DMA buffer immediately before the DMA occurs and to unmap it immediately after. Strict protection is costly due to IOMMU-related hardware overheads, motivating “deferred” intra-OS protection, which trades off s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of National Aviation University
سال: 2011
ISSN: 2306-1472,1813-1166
DOI: 10.18372/2306-1472.49.85