Translating security policy to executable code for sandboxing linux kernel
Translating security policy to executable code for sandboxing linux kernel
| dc.contributor.author | Mohanty, Hrushikesha | |
| dc.contributor.author | Venkataswamy, M. | |
| dc.contributor.author | Ramaswamy, Srini | |
| dc.contributor.author | Shyamasundar, R. K. | |
| dc.date.accessioned | 2022-03-27T05:56:30Z | |
| dc.date.available | 2022-03-27T05:56:30Z | |
| dc.date.issued | 2009-12-01 | |
| dc.description.abstract | Model based intrusion detection mechanisms have produced encouraging results for reduced false alarms. This paper extends our earlier work, where we reported for sandboxing Linux 2.6 using code generated from policies. Here we pursue the problem of code generation from a set of policies extracted from a domain model. Such a technique can support the safeguarding of system resources. We also present some of the features of the tool currently under development to automate the sandboxing process. © 2009 IEEE. | |
| dc.identifier.citation | EMS 2009 - UKSim 3rd European Modelling Symposium on Computer Modelling and Simulation | |
| dc.identifier.uri | 10.1109/EMS.2009.42 | |
| dc.identifier.uri | http://ieeexplore.ieee.org/document/5358813/ | |
| dc.identifier.uri | https://dspace.uohyd.ac.in/handle/1/8860 | |
| dc.subject | Code generator | |
| dc.subject | Linux kernel | |
| dc.subject | Sandboxing | |
| dc.title | Translating security policy to executable code for sandboxing linux kernel | |
| dc.type | Conference Proceeding. Conference Paper | |
| dspace.entity.type |
Files
License bundle
1 - 1 of 1