The kernel craze [computer security]
The kernel is a fundamental piece of the operating system that provides and mediates access to a computer system's resources. Naturally, such a critical component plays a key role in providing users with a secure environment and should be subject to security practitioners' scrutiny. The au...
Saved in:
Published in | IEEE security & privacy Vol. 2; no. 3; pp. 79 - 81 |
---|---|
Main Author | |
Format | Magazine Article |
Language | English |
Published |
New York
IEEE
01.05.2004
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 1540-7993 1558-4046 |
DOI | 10.1109/MSP.2004.25 |
Cover
Abstract | The kernel is a fundamental piece of the operating system that provides and mediates access to a computer system's resources. Naturally, such a critical component plays a key role in providing users with a secure environment and should be subject to security practitioners' scrutiny. The author focuses on kernel security issues, recent vulnerabilities, and the emergence of publicly available exploit code for them. |
---|---|
AbstractList | The kernel is a fundamental piece of the operating system that provides and mediates access to a computer system's resources. Naturally, such a critical component plays a key role in providing users with a secure environment and should be subject to security practitioners' scrutiny. The author focuses on kernel security issues, recent vulnerabilities, and the emergence of publicly available exploit code for them. |
Author | Arce, I. |
Author_xml | – sequence: 1 givenname: I. surname: Arce fullname: Arce, I. email: ivan.arce@coresecurity.com organization: Core Security Technol., Boston, MA, USA |
BookMark | eNpFkEtLw0AUhQepYFtduXQTxJ2k3juvzCyl1AdUFKwrkSGZ3mBrm9SZZFF_vQkVXFzOXXycA9-IDaq6IsbOESaIYG-eXl8mHEBOuDpiQ1TKpBKkHvS_hDSzVpywUYxrAI6ozJBdLT4p-aJQ0SbxIf-h5N3X213bUEgi-Tasmv3HKTsu802ks78cs7e72WL6kM6f7x-nt_PUc6Gb1JhSFJkGzZUVVvKSozRZrjTPeHdeSONtYYTOl4W3EpQ2qAoshcyXKNGLMbs89O5C_d1SbNy6bkPVTTrLwRgBFjvo-gD5UMcYqHS7sNrmYe8QXG_BdRZcb8Fx1dEXB3pFRP-kAG0zI34BZudWtg |
CODEN | ISPMCN |
ContentType | Magazine Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2004 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2004 |
DBID | RIA RIE AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1109/MSP.2004.25 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1558-4046 |
EndPage | 81 |
ExternalDocumentID | 2583183381 10_1109_MSP_2004_25 1306978 |
Genre | commentary |
GroupedDBID | -~X 0R~ 29I 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAVXG AAWTH ABAZT ABQJQ ABVLG ACIWK AENEX AETIX AFOGA AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV AZLTO BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD HZ~ H~9 IEDLZ IFIPE IPLJI JAVBF LAI M43 O9- OCL P2P PQQKQ RIA RIE RNI RNS RZB AAYOK AAYXX CITATION RIG 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c236t-88f3b76062593942f21487a56272627c348c9b836adbc94056815b1f34ad141c3 |
IEDL.DBID | RIE |
ISSN | 1540-7993 |
IngestDate | Fri Jul 25 07:22:02 EDT 2025 Tue Jul 01 04:18:33 EDT 2025 Wed Aug 27 02:49:40 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Issue | 3 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c236t-88f3b76062593942f21487a56272627c348c9b836adbc94056815b1f34ad141c3 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 14 |
PQID | 920883091 |
PQPubID | 85414 |
PageCount | 3 |
ParticipantIDs | proquest_journals_920883091 ieee_primary_1306978 crossref_primary_10_1109_MSP_2004_25 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2004-May-June 2004-05-00 20040501 |
PublicationDateYYYYMMDD | 2004-05-01 |
PublicationDate_xml | – month: 05 year: 2004 text: 2004-May-June |
PublicationDecade | 2000 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE security & privacy |
PublicationTitleAbbrev | SECP-M |
PublicationYear | 2004 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
SSID | ssj0021158 |
Score | 1.1604975 |
SecondaryResourceType | review_article |
Snippet | The kernel is a fundamental piece of the operating system that provides and mediates access to a computer system's resources. Naturally, such a critical... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Index Database Publisher |
StartPage | 79 |
SubjectTerms | Computer bugs Computer crashes Computer security Control systems exploit code Hardware Information security Kernel kernel bugs kernel security Operating systems Privacy Stability vulnerabilities |
Title | The kernel craze [computer security] |
URI | https://ieeexplore.ieee.org/document/1306978 https://www.proquest.com/docview/920883091 |
Volume | 2 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEB1qT56qVrFWJYceTdvsV3aPIpYiVAQtFERCMtlcKqm06aW_3skmqaIePARy2MAyzM7My76ZBzBIwwDRau6zOOW-yLLU10onfobCYigDy9CxLR7VdC4eFnLRgpt9L4y11pHP7LB8dXf56Qq35a-yEcVbRajnAA7IzaperT24osrGtb2VF_0hJd26Fy8Ym9Hs-ckBQaeH_S37ODmVXzHYJZZJB2bNlio-yXK4LZIh7n5Ma_zvno-g00yM9m4rnziGls1PoNPIN3j1ae7CgFzEW9p1bt89XMc7671is2hTy9q9ncJ8cv9yN_Vr0QQfGVeFr3XGk5BgCeEabgTLGAGeMKYyJ2T0IBcaTaK5itMEDZVrSgcyCTIu4jQQAfIzaOer3J6DJxGFlJnhKgyEHKPRDKVRsWKU-DMrejBojBl9VLMxIocpxiYim5cKlyJisgfd0ixfSyqL9KDfGD6qz80mMoyiHqca5uLvj_pwWFFnSsbhJbSL9dZeUVVQJNfOHT4B8OWybA |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1NS8NAEB20HvRUtYr1M4ceTW32K7tHEUvVVgQrCCIhmWwulSg1vfjrnWySKurBQyCHDSyP2Zl52Zl5AL00DBCt5j6LU-6LLEt9rXTiZygshjKwDF21xa0aPYjrR_m4AqfLXhhrrSs-s_3y1d3lp6-4KH-VnZG_VcR6VmGN4r6QVbfWkl5RbuMa38qr_pDCbt2NFwzM2eT-zlFBp4j9Lf44QZVfXtiFlmEbJs2mqoqSWX9RJH38-DGv8b-73oR2MzPaO6-sYgtWbL4N7UbAwavPcwd6ZCTezM5z--LhPP6w3hM2i95rYbvnHXgYXk4vRn4tm-Aj46rwtc54EhIxIWbDjWAZI8oTxpTohIwe5EKjSTRXcZqgoYRN6UAmQcZFnAYiQL4Lrfw1t3vgSUQhZWa4CgMhB2g0Q2lUrBiF_syKLvQaMKO3ajpG5FjFwESEealxKSImu9ApYflaUiHShYMG-Kg-Oe-RYeT3OGUx-39_dALro-lkHI2vbm8OYKMqpCnrDw-hVcwX9ohyhCI5dqbxCX2ftbk |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=The+kernel+craze+%5Bcomputer+security%5D&rft.jtitle=IEEE+security+%26+privacy&rft.au=Arce%2C+I.&rft.date=2004-05-01&rft.issn=1540-7993&rft.volume=2&rft.issue=3&rft.spage=79&rft.epage=81&rft_id=info:doi/10.1109%2FMSP.2004.25&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_MSP_2004_25 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1540-7993&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1540-7993&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1540-7993&client=summon |