"Operating System Call Integrity of the Linux Operating System examines the security exposures of the Linux Operating System arising from functions used in its construction. The ITS4 commercial package was used to identify suspect calls. While the package highlights a large number of different calls, almost all vulnerable calls in the operating systems were string related operations including printk and printf related functions. The results showed that the drivers directory of the Linux Operating System distribution was the most vulnerable"--Abstract, page iii.
Miller, Ann K.
McMillin, Bruce M.
Stigall, Paul D.
M.S. in Computer Science
University of Missouri--Rolla
vii, 35 pages
© 2003 Dayle Glenn Majors, All rights reserved.
Thesis - Restricted Access
Operating systems (Computers) -- Security measures
Print OCLC #
Link to Catalog Record
Electronic access to the full-text of this document is restricted to Missouri S&T users. Otherwise, request this publication directly from Missouri S&T Library or contact your local library.http://merlin.lib.umsystem.edu/record=b5070747~S5
Majors, Dayle Glenn, "Operating system call integrity of the Linux operating system" (2003). Masters Theses. 2373.
Share My Thesis If you are the author of this work and would like to grant permission to make it openly accessible to all, please click the button above.