ABSTRACT
Nowadays, the ways of obtaining unauthorized access to devices and are growing due to the increase in the volume of transmitted information. The topic of the article "Investigation of operating system security mechanisms for vulnerabilities" is to study the operating system vulnerability to attacks of unauthorized access. This article discusses the various possibilities for implementing internal attacks to gain unauthorized access. A criterion was selected, and a comparative analysis of operating system vulnerabilities to these attacks was carried out, as well as recommendations for improving resistance to these attacks are proposed.
- The Magic Garden Explained: The Internal of UNIX System V Release 4, An Open System Design. B. Goodheart, J. Cox. - Prentice Hall, 1994.Google Scholar
- The Design of the UNIX Operating System. Maurice J. Bach. - Prentice Hall, 1986.Google Scholar
- Modem Operating System. A.S. Tannenbaum. - Prentice Hall, 1992.Google Scholar
- Operating System. W. Stalling. - Prentice Hall, 1995.Google Scholar
- Galimeister B.O. “POSIX.4: Programming for the Real World”. Sebastopol* CA: O'Reilly & Associates, Inc., 1995.Google Scholar
- Bach M.J. “The Design of the UNIX Operating System”. Prentice-Hall, 1986.Google ScholarDigital Library
- Kashevnik, A., Ponomarev, A., Krasov, A. Human-Computer Threats Classification in Intelligent Transportation Systems: (2020) Conference of Open Innovation Association, FRUCT, 2020-April, art. no. 9087528, pp. 151-157.Google ScholarCross Ref
- Krasov, A., Vitkova, L., Pestov, I. Behavioral Analysis of Resource Allocation Systems in Cloud Infrastructure: Proceedings - 2019 International Russian Automation Conference, RusAutoCon 2019Google Scholar
- Protection for the distributed refusals in service (ddos) in cloud computing - Gelfand A., Kosov N., Krasov A., Orlov G. - In the collection: Actual problems of information telecommunications in science and education (APINO 2019). collection of scientific articles VIII International scientific-technical and scientific-methodological conferences: in 4 volumes. 2019. P. 329-334.Google Scholar
- Krasov, A., Vereshchagin, A., & Tsvetkov, A. (2013). Software Authentication Using the Embedding of Digital Watermarks into an Executable Code. //Telecommunications, (pp. 27-30). Moscow.Google Scholar
- Krasov, A., & Shterenberg, S. (2013). Development of Methods for the Software Copyright Protection Based on the Digital Watermarks Integrated into the Executable and Library Files. Actual Problems of Infocommunication in Science and Education, Saint Petersburg, pp.847-852.Google Scholar
- Shterenberg, S., & Andrianov, V. (2014). Methods of Selecting the Optimal Methods for Copyright Protection on Unix Systems Using the Executable and Library Files. Efektivní Nástroje Moderních Věd, Praha.Google Scholar
- Korzhik V., Nebaeva K., Gerling E., Dogil I., Fedyanin I. Digital steganography and digital watermarking. SPb.: SUT, 2016, 226 pGoogle Scholar
- Homyakov I.N., Krasov A.V. Hiding Information into java byte code structure//Control Systems and Information Technology, 2014, vol. 56 (2), pp. 89-93.Google Scholar
Index Terms
- Investigation of operating system security mechanisms for vulnerabilities
Recommendations
Security vulnerabilities and mitigation techniques of web applications
SIN '13: Proceedings of the 6th International Conference on Security of Information and NetworksWeb applications contain vulnerabilities, which may lead to serious security breaches such as stealing of confidential information. To protect against security breaches, it is necessary to understand the detailed steps of attacks and the pros and cons ...
Vulnerabilities of UMTS Access Domain Security Architecture
SNPD '08: Proceedings of the 2008 Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed ComputingThis paper presents vulnerabilities of UMTS access domain security architecture. The security architecture of UMTS offers some protection against known threats including false base station attacks, man-in-the-middle attacks and replay attacks. The ...
Unified security enhancement framework for the Android operating system
In these days there are many malicious applications that collect sensitive information owned by third-party applications by escalating their privileges to the higher level on the Android operating system. An attack of obtaining the root-level privilege ...
Comments