Login / Signup
Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions.
Xi Xiong
Donghai Tian
Peng Liu
Published in:
NDSS (2011)
Keyphrases
</>
operating system
data protection
kernel function
third party
real world
graph kernels
kernel methods
data confidentiality
open source
protection scheme
efficient implementation
information security
privacy preserving
virtual machine
feature space
case study
information systems
machine learning