Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Save to My Library
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Best Linux Exp

Best Linux Exp

Ratings: (0)|Views: 35 |Likes:
Published by Ashok K

More info:

Published by: Ashok K on Aug 21, 2009
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PPT, PDF, TXT or read online from Scribd
See more
See less





CS426 Fall 2006/Lecture 81
Computer SecurityCS 426
Lecture 8
Access Control for ProcessConfinement
CS426Fall 2006/Lecture 82
Readings for this lecture
Additional readings
 –Best Practices for UNIX chroot() Operations, –The Linux kernel capabilities FAQ –wikipedia topics: Introduction to virtualization,Operating system-level virtualization, FreeBSD jail,
CS426Fall 2006/Lecture 83
Review & Motivation
Softwares have vulnerabilities
 –most prominent is memory errors (e.g., buffer overflow, …)
Vulnerabilities can be exploited
Many layers of defense mechanisms exist
 –no mechanism is silver bullet
Security implications often caused by issues inaccess control?
Can we fix access control?

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->