skip to main content
10.1145/3440749.3442611acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicfndsConference Proceedingsconference-collections
research-article

Investigation of operating system security mechanisms for vulnerabilities

Published:13 May 2021Publication History

ABSTRACT

Nowadays, the ways of obtaining unauthorized access to devices and are growing due to the increase in the volume of transmitted information. The topic of the article "Investigation of operating system security mechanisms for vulnerabilities" is to study the operating system vulnerability to attacks of unauthorized access. This article discusses the various possibilities for implementing internal attacks to gain unauthorized access. A criterion was selected, and a comparative analysis of operating system vulnerabilities to these attacks was carried out, as well as recommendations for improving resistance to these attacks are proposed.

References

  1. The Magic Garden Explained: The Internal of UNIX System V Release 4, An Open System Design. B. Goodheart, J. Cox. - Prentice Hall, 1994.Google ScholarGoogle Scholar
  2. The Design of the UNIX Operating System. Maurice J. Bach. - Prentice Hall, 1986.Google ScholarGoogle Scholar
  3. Modem Operating System. A.S. Tannenbaum. - Prentice Hall, 1992.Google ScholarGoogle Scholar
  4. Operating System. W. Stalling. - Prentice Hall, 1995.Google ScholarGoogle Scholar
  5. Galimeister B.O. “POSIX.4: Programming for the Real World”. Sebastopol* CA: O'Reilly & Associates, Inc., 1995.Google ScholarGoogle Scholar
  6. Bach M.J. “The Design of the UNIX Operating System”. Prentice-Hall, 1986.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Kashevnik, A., Ponomarev, A., Krasov, A. Human-Computer Threats Classification in Intelligent Transportation Systems: (2020) Conference of Open Innovation Association, FRUCT, 2020-April, art. no. 9087528, pp. 151-157.Google ScholarGoogle ScholarCross RefCross Ref
  8. Krasov, A., Vitkova, L., Pestov, I. Behavioral Analysis of Resource Allocation Systems in Cloud Infrastructure: Proceedings - 2019 International Russian Automation Conference, RusAutoCon 2019Google ScholarGoogle Scholar
  9. Protection for the distributed refusals in service (ddos) in cloud computing - Gelfand A., Kosov N., Krasov A., Orlov G. - In the collection: Actual problems of information telecommunications in science and education (APINO 2019). collection of scientific articles VIII International scientific-technical and scientific-methodological conferences: in 4 volumes. 2019. P. 329-334.Google ScholarGoogle Scholar
  10. Krasov, A., Vereshchagin, A., & Tsvetkov, A. (2013). Software Authentication Using the Embedding of Digital Watermarks into an Executable Code. //Telecommunications, (pp. 27-30). Moscow.Google ScholarGoogle Scholar
  11. Krasov, A., & Shterenberg, S. (2013). Development of Methods for the Software Copyright Protection Based on the Digital Watermarks Integrated into the Executable and Library Files. Actual Problems of Infocommunication in Science and Education, Saint Petersburg, pp.847-852.Google ScholarGoogle Scholar
  12. Shterenberg, S., & Andrianov, V. (2014). Methods of Selecting the Optimal Methods for Copyright Protection on Unix Systems Using the Executable and Library Files. Efektivní Nástroje Moderních Věd, Praha.Google ScholarGoogle Scholar
  13. Korzhik V., Nebaeva K., Gerling E., Dogil I., Fedyanin I. Digital steganography and digital watermarking. SPb.: SUT, 2016, 226 pGoogle ScholarGoogle Scholar
  14. Homyakov I.N., Krasov A.V. Hiding Information into java byte code structure//Control Systems and Information Technology, 2014, vol. 56 (2), pp. 89-93.Google ScholarGoogle Scholar

Index Terms

  1. Investigation of operating system security mechanisms for vulnerabilities
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            ICFNDS '20: Proceedings of the 4th International Conference on Future Networks and Distributed Systems
            November 2020
            313 pages
            ISBN:9781450388863
            DOI:10.1145/3440749

            Copyright © 2020 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 13 May 2021

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited
          • Article Metrics

            • Downloads (Last 12 months)72
            • Downloads (Last 6 weeks)7

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format