咨询与建议

限定检索结果

文献类型

  • 15 篇 会议
  • 12 篇 期刊文献
  • 1 篇 学位论文

馆藏范围

  • 28 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 25 篇 工学
    • 23 篇 计算机科学与技术...
    • 11 篇 电气工程
    • 9 篇 信息与通信工程
    • 9 篇 软件工程
    • 1 篇 控制科学与工程
    • 1 篇 交通运输工程
    • 1 篇 网络空间安全
  • 2 篇 理学
    • 2 篇 数学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 28 篇 operating system...
  • 4 篇 high performance...
  • 4 篇 distributed syst...
  • 4 篇 security
  • 3 篇 deep learning
  • 3 篇 malware intercep...
  • 2 篇 linux
  • 2 篇 operating system...
  • 2 篇 environment mode...
  • 2 篇 distributed inte...
  • 2 篇 kernel module
  • 2 篇 static verificat...
  • 2 篇 operating system...
  • 2 篇 software quality
  • 2 篇 codes
  • 2 篇 distributed inte...
  • 2 篇 inter process co...
  • 2 篇 real-time
  • 1 篇 context aware ap...
  • 1 篇 co-processors

机构

  • 3 篇 iran univ sci & ...
  • 2 篇 russian acad sci...
  • 1 篇 duke univ dept c...
  • 1 篇 department of co...
  • 1 篇 florida inst tec...
  • 1 篇 christopher newp...
  • 1 篇 stanford univ. s...
  • 1 篇 university of no...
  • 1 篇 zhejiang univ zj...
  • 1 篇 univ groningen d...
  • 1 篇 oakland univ dep...
  • 1 篇 beijing inst tec...
  • 1 篇 department of co...
  • 1 篇 zhejiang univ ke...
  • 1 篇 isp ras moscow
  • 1 篇 university of ch...
  • 1 篇 graduate school ...
  • 1 篇 unist ulsan
  • 1 篇 zhongguancun lab...
  • 1 篇 university of ca...

作者

  • 3 篇 sharifi mohsen
  • 3 篇 khaneghah ehsan ...
  • 3 篇 mirtaheri seyede...
  • 2 篇 sutton sara
  • 1 篇 halang wa
  • 1 篇 das dipanjan
  • 1 篇 jiao longlong
  • 1 篇 efremov denis
  • 1 篇 celikkan ufuk
  • 1 篇 deswarte yves
  • 1 篇 lacombe éric
  • 1 篇 kurtel kaan
  • 1 篇 holliday ma
  • 1 篇 tu jinjiang
  • 1 篇 allen william h.
  • 1 篇 wei li long chen...
  • 1 篇 novikov e. m.
  • 1 篇 zhang ni
  • 1 篇 larowe rp
  • 1 篇 khoroshilov a. v...

语言

  • 25 篇 英文
  • 2 篇 中文
  • 1 篇 其他
检索条件"主题词=Operating System Kernel"
28 条 记 录,以下是1-10 订阅
排序:
A HARDWARE SUPPORTED operating system kernel FOR EMBEDDED HARD REAL-TIME APPLICATIONS
收藏 引用
MICROPROCESSORS AND MICROsystemS 1994年 第10期18卷 579-591页
作者: COLNARIC, M HALANG, WA TOL, RM FERNUNIV FAC ELECT ENGND-58084 HAGENGERMANY UNIV GRONINGEN DEPT COMP SCI9700 AV GRONINGENNETHERLANDS
The concept of the kernel, i.e. the time critical part of a real-time operating system, and its dedicated co-processor, especially tailored for embedded applications, are presented. The co-processor acts as a system c... 详细信息
来源: 评论
AIT: A method for operating system kernel function call graph generation with a virtualization technique
收藏 引用
KSII TRANSACTIONS ON INTERNET AND INFORMATION systemS 2020年 第5期14卷 2084-2100页
作者: Jiao, Longlong Luo, Senlin Liu, Wangtong Pan, Limin Beijing Inst Technol Informat Syst & Secur & Countermeasures Expt Ctr Beijing 100081 Peoples R China
operating system (OS) kernel function call graphs have been widely used in OS analysis and defense. However, most existing methods and tools for generating function call graphs are designed for application programs, a... 详细信息
来源: 评论
Evaluating kernel Anti-Exploitation Capabilities: A Scalable and General Framework Based on Evaluatology  16th
Evaluating Kernel Anti-Exploitation Capabilities: A Scalable...
收藏 引用
16th BenchCouncil International Symposium on Benchmarking, Measuring, and Optimizing, Bench 2024
作者: Chen, Simin Li, Dong Wu, Chenggang Zhan, Jianfeng SKLP Institute of Computing Technology CAS Beijing China University of Chinese Academy of Sciences Beijing China Zhongguancun Laboratory Beijing China
kernel security is pivotal to overall system security, given the kernel’s complete access to system resources and its operation at the highest privilege level. Despite obtaining high-security certifications, kernels ... 详细信息
来源: 评论
kCPA: Towards Sensitive Pointer Full Life Cycle Authentication for OS kernels
收藏 引用
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 2024年 第4期21卷 3768-3784页
作者: Yang, Yutian Tu, Jinjiang Shen, Wenbo Zhu, Songbo Chang, Rui Zhou, Yajin Zhejiang Univ ZJU Hangzhou Global Sci & Technol Innovat Ctr Hangzhou Peoples R China Zhejiang Univ Key Lab Blockchain & Cyberspace Governance Zhejia Hangzhou 310027 Peoples R China
Nowadays, code reuse attacks impose a substantial threat to the security of operating system kernels. Control-flow graph-based CFI techniques, while effective, bring considerable performance overhead, thus limiting th... 详细信息
来源: 评论
Decoy Processes With Optimal Performance Fingerprints
收藏 引用
IEEE ACCESS 2023年 11卷 43216-43237页
作者: Sutton, Sara M. Rrushi, Julian L. Grand Valley State Univ Sch Comp & Informat Syst Allendale MI 49401 USA Oakland Univ Dept Comp Sci Rochester MI 48309 USA
Decoy targets such as honeypots and decoy I/O are characterized by a higher accuracy in detecting intrusions than anomaly, misuse, and specification-based detectors. Unlike these detectors, decoy targets do not attack... 详细信息
来源: 评论
Configurable toolset for static verification of operating systems kernel modules
收藏 引用
PROGRAMMING AND COMPUTER SOFTWARE 2015年 第1期41卷 49-64页
作者: Zakharov, I. S. Mandrykin, M. U. Mutilin, V. S. Novikov, E. M. Petrenko, A. K. Khoroshilov, A. V. Russian Acad Sci Inst Syst Programming Moscow 109004 Russia
An operating system (OS) kernel is a critical software regarding to reliability and efficiency. Quality of modern OS kernels is already high enough. However, this is not the case for kernel modules, like, for example,... 详细信息
来源: 评论
How not to be seen II - The defenders fight back
收藏 引用
IEEE SECURITY & PRIVACY 2007年 第6期5卷 65-68页
作者: Allen, William H. Ford, Richard Florida Inst Technol Melbourne FL 32901 USA
For pt.I see ibid., vol. 5, no.1, p.67-69 (2007). This article discusses about stealthy software-that is, software that manipulates a computer in some way to avoid some aspect of its operation. The stealth is divided ... 详细信息
来源: 评论
kernel SUPPORT FOR LIVE DIGITAL AUDIO AND VIDEO
收藏 引用
COMPUTER COMMUNICATIONS 1992年 第6期15卷 388-395页
作者: JEFFAY, K STONE, DL SMITH, FD University of North Carolina at Chapel Hill Department of Computer Science Chapel Hill NC 27599-3175 USA
We have developed a real-time operating system kernel which has been used to support the transmission and reception of streams of live digital audio and video in real-time as part of a workstation-based conferencing a... 详细信息
来源: 评论
THE V-DISTRIBUTED system
收藏 引用
COMMUNICATIONS OF THE ACM 1988年 第3期31卷 314-333页
作者: CHERITON, DR Stanford Univ. Stanford CA
The V distributed system was developed at Stanford University as part of a research project to explore issues in distributed systems. Aspects of the design suggest important directions for the design of future operati... 详细信息
来源: 评论
DISTRIBUTED systemS MANAGEMENT - OVERVIEW OF A COST-11 TER PROJECT
COMPUTER NETWORKS AND ISDN SYSTEMS
收藏 引用
COMPUTER NETWORKS AND ISDN systemS 1988年 第1期15卷 61-65页
作者: LANGSFORD, A HARWELL LAB DIDCOR OX11 ORAOXONENGLAND
The paper provides an introduction to and overview of one of the COST-11 ter projects. It sets out the scope and objectives of the work and summarises the three main threads of activity at the mid-point of the project... 详细信息
来源: 评论