Semantic Scholar uses AI to extract papers important to this topic.
With a rise in the deployment of electronics in today’s systems especially in automobiles, the task of securing them against… Expand In this paper we present a model for defining and enforcing a fine-grained information flow policy. We describe how the policy… Expand Developing a modular system that properly supports a range of security models is challenging. The work presented here details our… Expand With the increasing popularity of the Internet, more and more applications are extensively exploited on it. In the wake of that… Expand We present a technique for automatic placement of authorization hooks, and apply it to the Linux security modules (LSM) framework… Expand We present a consistency analysis approach to assist the Linux community in verifying the correctness of authorization hook… Expand The access control mechanisms of existing mainstream operating systems are inadequate to provide strong system security. Enhanced… Expand In this paper, we present an approach for analyzing the integrity protection in the SELinux example policy. The SELinux example… Expand We present runtime tools to assist the Linux community in verifying the correctness of the Linux Security Modules (LSM) framework… Expand