Thepaper reviews some famous Linux security tools based on system calls interception. The LKM model of security policy enforcement for Linux is offered
Download file
Counter downloads: 64
- Title SECURITY LINUX EXTENSION BASED ON SYSTEM CALLS INTERPOSITION
- Headline SECURITY LINUX EXTENSION BASED ON SYSTEM CALLS INTERPOSITION
- Publesher
Tomsk State University
- Issue Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics 2(2)
- Date:
- DOI
Keywords
модуль ядра , политики безопасности , перехват системных вызовов Authors
References
Стефанцов Д.А. Реализация политик безопасности в компьютерных системах с помощью аспектно-ориентированного программирования // Прикладная дискретная математика. 2008. № 1. С. 94 - 100.
Куликов М.Л., Ромашкин Е.В., Стефанцов Д.А. Разработка средств моделирования политик безопасности операционных систем // Вестник ТГУ. Приложение. 2007. № 23. С. 189 - 193.
Garfmkel Т., Pfaff B., Rosenblum M. Ostia: A Delegating Architecture for Secure System Call Interposition. <http://citeseer>.<ist.psu.edu/garfinkel03ostia.h1ml>.
Garfmkel T. Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools, www.stanford.edu/ <http://www.stanford.edu/>~talg/papers/traps/traps-ndss03.pdf.
Proves N. Improving Host Security with System Call Policies, November 2002. <http://citeseer.ist.psu.edu/provos02improving>. html.
Fraser T. LOMAC: MAC You CanLive With. -USENIX, 2001. -<http://portal.acm.org/citation.cfm?id=71575>.
Wagner D.A. Janus: an approach for confinement of untrusted applications. Technical Report CSD-99-1056. 12. 1999. <http://citeseer.ist.psu.edu/wagner99janus.html>.
Goldberg I., Wagner D., Thomas R., Eric A. Brewer. A Secure Environment for Untrusted Helper Applications // Proceedings of the 6th Usenix Security Symposium, July 1996.

SECURITY LINUX EXTENSION BASED ON SYSTEM CALLS INTERPOSITION | Prikladnaya Diskretnaya Matematika - Applied Discrete Mathematics. 2008. № 2(2).
Download full-text version
Download fileCounter downloads: 410