Essays about: "SELinux"

Found 5 essays containing the word SELinux.

  1. 1. Methods for avoiding rooting in Android System

    University essay from Linnéuniversitetet/Institutionen för datavetenskap (DV)

    Author : Haofei Yan; [2017]
    Keywords : Android root exploits; SEAndroid Rooting;

    Abstract : Android Rooting allows the user to modify the system such as removing the pre-installed apps they dislike. However, rooting is not easy like before. Google has introduced SELinux to the Android system. It required doing more work to achieve rooting function. READ MORE

  2. 2. A Security Assessment of Virtualized Residential Gateways: : Securely Deploying Third Party Services

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Da Lu; [2012]
    Keywords : ;

    Abstract : Scalable, portable and flexible way of providing services can be realized by the means of virtualization technology, where parallel VMs are built on top of a shared hardware implementation. At the same time, securely deploying services has been receiving more attentions. READ MORE

  3. 3. Evaluation of Linux Security Frameworks

    University essay from Institutionen för datavetenskap

    Author : Erik Karlsson; [2010]
    Keywords : ;

    Abstract :   The number of threats to computers attached to networks continually increases. The focus of preventing security exploits has been on the network, while local exploits has been mostly overlooked. Many security problems in Unix systems stem from the way security is managed; by delegating all security decisions to object owners. READ MORE

  4. 4. Comparative study of operating system security using SELinux and Systrace

    University essay from Institutionen för kommunikation och design

    Author : Jonas Öberg; [2009]
    Keywords : OpenBSD; Linux; security; SELinux; Systrace;

    Abstract : This thesis makes a comparative study of the security systemsSystrace (used primarily with OpenBSD) and SELinux (usedexclusively with Linux), trying to answer the question as to whichtype of security is offered by each respective system, and wheneach should be used. The key difference between SELinux andSystrace seems to be their mode of operation, where SELinux,built around the LSM framework in the Linux kernel, works withtype enforcement on files, sockets and other objects, whereasSystrace works on a strict system call basis. READ MORE

  5. 5. Comparative Study of Containment Strategies in Solaris and Security Enhanced Linux

    University essay from Institutionen för datavetenskap

    Author : Magnus Eriksson; Staffan Palmroos; [2007]
    Keywords : Solaris Zones; Solaris Containers; SELinux; containment strategies; virtualization;

    Abstract : To minimize the damage in the event of a security breach it is desirable to limit the privileges of remotely available services to the bare minimum and to isolate the individual services from the rest of the operating system. To achieve this there is a number of different containment strategies and process privilege security models that may be used. READ MORE