Hardware, Software Advances Help Protect Operating Systems from Attack

The operating system (OS) is the backbone of your computer. If the OS is compromised, attackers can take over your computer — or crash it. Now researchers at North Carolina State University have developed an efficient system that utilizes hardware and software to restore an OS if it is attacked.

At issue are security attacks in which an outside party successfully compromises one computer application (such as a Web browser) and then uses that application to gain access to the OS.

For example, the compromised application could submit a “system call” to the OS, effectively asking the OS to perform a specific function. However, instead of a routine function, the attacker would use the system call to attempt to gain control of the OS.

“Our goal is to give the OS the ability to survive such attacks,” says Dr. Yan Solihin, an associate professor of electrical and computer engineering at NC State and co-author of a paper describing the new system. “Our approach has three components: attack detection; security fault isolation; and recovery.” Continue reading…

Related Posts

Debugging a failed Ansible ad hoc command Ansible is an IT automation and configuration management tool. Of all the most popular Free Software applications of its kind, it is the only one that...
ownCloud 1.1 released ownCloud 1.1 has been released. I´m really happy with this release. Not only because we have a lot of new features and bugfixes but also because the o...
dex: A OpenID Connect Identity Provider from CoreOS Announced a few days ago, dex is an open source OpenID Connect Identity Provider from the good folks at CoreOS. CoreOS is a major player in the con...
Amazon’s Prime Air drone delivery sounds great, but it’s DoA So 60 Minutes gave Amazon's Jeff Bezos a platform to tout his company's next great idea - Prime Air, a 30-minute delivery service via small unmanned a...
GNUnet submits draft for p2p-related TLDs to the IETF A GNUnet official, has submitted a request to the IETF, the Internet Engineering Task Force, the organization responsible for developing and promoting...
Internet monitoring system to publish tools as open source An Estonian government project to safeguard the country's Internet infrastructure will publish some of the tools it is developing as open source, usin...

We Recommend These Vendors and Free Offers

ContainerizeThis 2016 is a free, 2-day conference for all things containers and big data. Featured, will be presentations and free, hands-on workshops. Learn more at ContainerizeThis.com

Launch an SSD VPS in Europe, USA, Asia & Australia on Vultr's KVM-based Cloud platform starting at $5:00/month (15 GB SSD, 768 MB of RAM).

Deploy an SSD Cloud server in 55 seconds on DigitalOcean. Built for developers and starting at $5:00/month (20 GB SSD, 512 MB of RAM).

Want to become an expert ethical hacker and penetration tester? Request your free video training course of Online Penetration Testing and Ethical Hacking

Whether you're new to Linux or are a Linux guru, you can learn a lot more about the Linux kernel by requesting your free ebook of Linux Kernel In A Nutshell.


One Comment

  1. Pingback: Tweets that mention Hardware, Software Advances Help Protect Operating Systems from Attack -- Topsy.com

Leave a Comment

Your email address will not be published. Required fields are marked *

*