A. Katasonov, Aleksandr Tcvetkov, Anna Polyanicheva, A. Krasov
{"title":"调查操作系统安全机制的漏洞","authors":"A. Katasonov, Aleksandr Tcvetkov, Anna Polyanicheva, A. Krasov","doi":"10.1145/3440749.3442611","DOIUrl":null,"url":null,"abstract":"Nowadays, the ways of obtaining unauthorized access to devices and are growing due to the increase in the volume of transmitted information. The topic of the article \"Investigation of operating system security mechanisms for vulnerabilities\" is to study the operating system vulnerability to attacks of unauthorized access. This article discusses the various possibilities for implementing internal attacks to gain unauthorized access. A criterion was selected, and a comparative analysis of operating system vulnerabilities to these attacks was carried out, as well as recommendations for improving resistance to these attacks are proposed.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Investigation of operating system security mechanisms for vulnerabilities\",\"authors\":\"A. Katasonov, Aleksandr Tcvetkov, Anna Polyanicheva, A. Krasov\",\"doi\":\"10.1145/3440749.3442611\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, the ways of obtaining unauthorized access to devices and are growing due to the increase in the volume of transmitted information. The topic of the article \\\"Investigation of operating system security mechanisms for vulnerabilities\\\" is to study the operating system vulnerability to attacks of unauthorized access. This article discusses the various possibilities for implementing internal attacks to gain unauthorized access. A criterion was selected, and a comparative analysis of operating system vulnerabilities to these attacks was carried out, as well as recommendations for improving resistance to these attacks are proposed.\",\"PeriodicalId\":344578,\"journal\":{\"name\":\"Proceedings of the 4th International Conference on Future Networks and Distributed Systems\",\"volume\":\"20 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 4th International Conference on Future Networks and Distributed Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3440749.3442611\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3440749.3442611","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Investigation of operating system security mechanisms for vulnerabilities
Nowadays, the ways of obtaining unauthorized access to devices and are growing due to the increase in the volume of transmitted information. The topic of the article "Investigation of operating system security mechanisms for vulnerabilities" is to study the operating system vulnerability to attacks of unauthorized access. This article discusses the various possibilities for implementing internal attacks to gain unauthorized access. A criterion was selected, and a comparative analysis of operating system vulnerabilities to these attacks was carried out, as well as recommendations for improving resistance to these attacks are proposed.